Pass the ECCouncil ECSA 412-79 Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

How many bits is Source Port Number in TCP Header packet?

Options:

A.

48


B.

32


C.

64


D.

16


Expert Solution
Questions # 42:

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

Options:

A.

IPSEC does not work with packet filtering firewalls


B.

NAT does not work with IPSEC


C.

NAT does not work with statefull firewalls


D.

Statefull firewalls do not work with packet filtering firewalls


Expert Solution
Questions # 43:

When reviewing web logs, you see an entry for resource not found in the HTTP status code fileD. What is the actual error code that you would see in the log for resource not found?

Options:

A.

202


B.

404


C.

505


D.

909


Expert Solution
Questions # 44:

Which is a standard procedure to perform during all computer forensics investigations?

Options:

A.

with the hard drive removed from the suspect PC, check the date and time in the system‟s CMOS


B.

with the hard drive in the suspect PC, check the date and time in the File Allocation Table


C.

with the hard drive removed from the suspect PC, check the date an d time in the system‟s RAM


D.

with the hard drive in the suspect PC, check the date and time in the system‟s CMOS


Expert Solution
Questions # 45:

The MD5 program is used to:

Options:

A.

wipe magnetic media before recycling it


B.

make directories on a evidence disk


C.

view graphics files on an evidence drive


D.

verify that a disk is not altered when you examine it


Expert Solution
Questions # 46:

When monitoring for both intrusion and security events between multiple computers, it is essential that the computers‟ clocks are synchronize D. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?

Options:

A.

Universal Time Set


B.

Network Time Protocol


C.

SyncTime Service


D.

Time-Sync Protocol


Expert Solution
Questions # 47:

E-mail logs contain which of the following information to help you in your investigation? (Select up to 4)

Options:

A.

user account that was used to send the account


B.

attachments sent with the e-mail message


C.

unique message identifier


D.

contents of the e-mail message


E.

date and time the message was sent


Expert Solution
Questions # 48:

If a suspect computer is located in an area that may have toxic chemicals, you must:

Options:

A.

coordinate with the HAZMAT team


B.

determine a way to obtain the suspect computer


C.

assume the suspect machine is contaminated


D.

do not enter alone


Expert Solution
Questions # 49:

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

Options:

A.

evidence must be handled in the same way regardless of the type of case


B.

evidence procedures are not important unless you work for a law enforcement agency


C.

evidence in a criminal case must be secured more tightly than in a civil case


D.

evidence in a civil case must be secured more tightly than in a criminal case


Expert Solution
Questions # 50:

You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive. Which of the following formats correctly specifies these sectors?

Options:

A.

0:1000, 150


B.

0:1709, 150


C.

1:1709, 150


D.

0:1709-1858


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions