Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions
Questions # 61:

Why would you need to find out the gateway of a device when investigating a wireless attack?

Options:

A.

The gateway will be the IP of the proxy server used by the attacker to launch the attack


B.

The gateway will be the IP of the attacker computer


C.

The gateway will be the IP used to manage the RADIUS server


D.

The gateway will be the IP used to manage the access point


Expert Solution
Questions # 62:

Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?

22,164 cylinders/disk

80 heads/cylinder

63 sectors/track

Options:

A.

53.26 GB


B.

57.19 GB


C.

11.17 GB


D.

10 GB


Expert Solution
Questions # 63:

When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?

Options:

A.

All virtual memory will be deleted


B.

The wrong partition may be set to active


C.

This action can corrupt the disk


D.

The computer will be set in a constant reboot state


Expert Solution
Questions # 64:

Stephen is checking an image using Compare Files by The Wizard, and he sees the file signature is shown as FF D8 FF E1. What is the file type of the image?

Options:

A.

gif


B.

bmp


C.

jpeg


D.

png


Expert Solution
Questions # 65:

What will the following command accomplish?

dd if=/dev/xxx of=mbr.backup bs=512 count=1

Options:

A.

Back up the master boot record


B.

Restore the master boot record


C.

Mount the master boot record on the first partition of the hard drive


D.

Restore the first 512 bytes of the first partition of the hard drive


Expert Solution
Questions # 66:

Which password cracking technique uses every possible combination of character sets?

Options:

A.

Rainbow table attack


B.

Brute force attack


C.

Rule-based attack


D.

Dictionary attack


Expert Solution
Questions # 67:

An expert witness is a __________________ who is normally appointed by a party to assist the formulation and preparation of a party’s claim or defense.

Options:

A.

Expert in criminal investigation


B.

Subject matter specialist


C.

Witness present at the crime scene


D.

Expert law graduate appointed by attorney


Expert Solution
Questions # 68:

Which of the following stages in a Linux boot process involve initialization of the system’s hardware?

Options:

A.

BIOS Stage


B.

Bootloader Stage


C.

BootROM Stage


D.

Kernel Stage


Expert Solution
Questions # 69:

What must an investigator do before disconnecting an iPod from any type of computer?

Options:

A.

Unmount the iPod


B.

Mount the iPod


C.

Disjoin the iPod


D.

Join the iPod


Expert Solution
Questions # 70:

What is the default IIS log location?

Options:

A.

SystemDrive\inetpub\LogFiles


B.

%SystemDrive%\inetpub\logs\LogFiles


C.

%SystemDrive\logs\LogFiles


D.

SystemDrive\logs\LogFiles


Expert Solution
Questions # 71:

To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?

Options:

A.

Post-investigation Phase


B.

Reporting Phase


C.

Pre-investigation Phase


D.

Investigation Phase


Expert Solution
Questions # 72:

Depending upon the jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?

Options:

A.

18 USC §1029


B.

18 USC §1030


C.

18 USC §1361


D.

18 USC §1371


Expert Solution
Questions # 73:

All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?

Options:

A.

Blackberry Message Center


B.

Microsoft Exchange


C.

Blackberry WAP gateway


D.

Blackberry WEP gateway


Expert Solution
Questions # 74:

Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?

Options:

A.

Events history


B.

Previously typed commands


C.

History of the browser


D.

Passwords used across the system


Expert Solution
Questions # 75:

What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?

Options:

A.

Copyright


B.

Design patent


C.

Trademark


D.

Utility patent


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions