Pass the ECCouncil ECSA 412-79 Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

What happens when a file is deleted by a Microsoft operating system using the FAT file system?

Options:

A.

only the reference to the file is removed from the FAT


B.

the file is erased and cannot be recovered


C.

a copy of the file is stored and the original file is erased


D.

the file is erased but can be recovered


Expert Solution
Questions # 52:

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?

Options:

A.

trademark law


B.

copyright law


C.

printright law


D.

brandmark law


Expert Solution
Questions # 53:

When investigating a potential e-mail crime, what is your first step in the investigation?

Options:

A.

Trace the IP address to its origin


B.

Write a report


C.

Determine whether a crime was actually committed


D.

Recover the evidence


Expert Solution
Questions # 54:

In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?

Options:

A.

rules of evidence


B.

law of probability


C.

chain of custody


D.

policy of separation


Expert Solution
Questions # 55:

It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?

Options:

A.

by law, three


B.

quite a few


C.

only one


D.

at least two


Expert Solution
Questions # 56:

The following excerpt is taken from a honeypot log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. (Note: The objective of this question is to test whether the student can read basic information from log entries and interpret the nature of attack.) Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169 Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482 Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53 Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21 Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53 Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111 Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80 Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53 Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53 Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0) Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506) Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080 Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558 From the options given below choose the one which best interprets the following entry: Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

Options:

A.

An IDS evasion technique


B.

A buffer overflow attempt


C.

A DNS zone transfer


D.

Data being retrieved from 63.226.81.13


Expert Solution
Questions # 57:

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?

Options:

A.

rootkit


B.

key escrow


C.

steganography


D.

Offset


Expert Solution
Questions # 58:

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

Options:

A.

.email


B.

.mail


C.

.pst


D.

.doc


Expert Solution
Questions # 59:

Sectors in hard disks typically contain how many bytes?

Options:

A.

256


B.

512


C.

1024


D.

2048


Expert Solution
Questions # 60:

Area density refers to:

Options:

A.

the amount of data per disk


B.

the amount of data per partition


C.

the amount of data per square inch


D.

the amount of data per platter


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions