Pass the ECCouncil ECSA 412-79 Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

Options:

A.

Fraggle


B.

SYN flood


C.

Trinoo


D.

Smurf


Expert Solution
Questions # 12:

What does ICMP Type 3/Code 13 mean?

Options:

A.

Host Unreachable


B.

Port Unreachable


C.

Protocol Unreachable


D.

Administratively Blocked


Expert Solution
Questions # 13:

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

Options:

A.

Ping trace


B.

Tracert


C.

Smurf scan


D.

ICMP ping sweep


Expert Solution
Questions # 14:

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?

Options:

A.

Enable BGP


B.

Disable BGP


C.

Enable direct broadcasts


D.

Disable direct broadcasts


Expert Solution
Questions # 15:

A law enforcement officer may only search for and seize criminal evidence with _____________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the specific crime exists and the evidence of the specific crime exists at the place to be searcheD.

Options:

A.

Mere Suspicion


B.

A preponderance of the evidence


C.

Probable cause


D.

Beyond a reasonable doubt


Expert Solution
Questions # 16:

Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual mediA. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?

Options:

A.

Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media


B.

Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence


C.

Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media


D.

Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media


Expert Solution
Questions # 17:

Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?

Options:

A.

Sector


B.

Metadata


C.

MFT


D.

Slack Space


Expert Solution
Questions # 18:

What should you do when approached by a reporter about a case that you are working on or have worked on?

Options:

A.

Refer the reporter to the attorney that retained you


B.

Say, “no comment”


C.

Answer all the reporters questions as completely as possible


D.

Answer only the questions that help your case


Expert Solution
Questions # 19:

When using Windows acquisitions tools to acquire digital evidence, it is important to use a well- tested hardware write-blocking device to:

Options:

A.

Automate Collection from image files


B.

Avoiding copying data from the boot partition


C.

Acquire data from host-protected area on a disk


D.

Prevent Contamination to the evidence drive


Expert Solution
Questions # 20:

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?

Options:

A.

the File Allocation Table


B.

the file header


C.

the file footer


D.

the sector map


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions