Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions
Questions # 46:

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?

Options:

A.

rootkit


B.

key escrow


C.

steganography


D.

Offset


Expert Solution
Questions # 47:

You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?

Options:

A.

Airsnort


B.

Snort


C.

Ettercap


D.

RaidSniff


Expert Solution
Questions # 48:

What are the security risks of running a "repair" installation for Windows XP?

Options:

A.

Pressing Shift+F10gives the user administrative rights


B.

Pressing Shift+F1gives the user administrative rights


C.

Pressing Ctrl+F10 gives the user administrative rights


D.

There are no security risks when running the "repair" installation for Windows XP


Expert Solution
Questions # 49:

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?

Options:

A.

Entrapment


B.

Enticement


C.

Intruding into a honeypot is not illegal


D.

Intruding into a DMZ is not illegal


Expert Solution
Questions # 50:

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test.

The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

Options:

A.

False negatives


B.

False positives


C.

True negatives


D.

True positives


Expert Solution
Questions # 51:

If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?

Options:

A.

true


B.

false


Expert Solution
Questions # 52:

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?

Options:

A.

Social Validation


B.

Scarcity


C.

Friendship/Liking


D.

Reciprocation


Expert Solution
Questions # 53:

What will the following URL produce in an unpatched IIS Web Server?

http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\

Options:

A.

Directory listing of C: drive on the web server


B.

Insert a Trojan horse into the C: drive of the web server


C.

Execute a buffer flow in the C: drive of the web server


D.

Directory listing of the C:\windows\system32 folder on the web server


Expert Solution
Questions # 54:

A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?

Options:

A.

They examined the actual evidence on an unrelated system


B.

They attempted to implicate personnel without proof


C.

They tampered with evidence by using it


D.

They called in the FBI without correlating with the fingerprint data


Expert Solution
Questions # 55:

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

Options:

A.

The X509 Address


B.

The SMTP reply Address


C.

The E-mail Header


D.

The Host Domain Name


Expert Solution
Questions # 56:

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

Options:

A.

Cached password hashes for the past 20 users


B.

Service account passwords in plain text


C.

IAS account names and passwords


D.

Local store PKI Kerberos certificates


Expert Solution
Questions # 57:

When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

Options:

A.

Recycle Bin


B.

MSDOS.sys


C.

BIOS


D.

Case files


Expert Solution
Questions # 58:

In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?

Options:

A.

The ISP can investigate anyone using their service and can provide you with assistance


B.

The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant


C.

The ISP can't conduct any type of investigations on anyone and therefore can't assist you


D.

ISP's never maintain log files so they would be of no use to your investigation


Expert Solution
Questions # 59:

What binary coding is used most often for e-mail purposes?

Options:

A.

MIME


B.

Uuencode


C.

IMAP


D.

SMTP


Expert Solution
Questions # 60:

Which of the following tool can the investigator use to analyze the network to detect Trojan activities?

Options:

A.

Regshot


B.

TRIPWIRE


C.

RAM Computer


D.

Capsa


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions