Pass the ECCouncil ECSA 412-79 Questions and answers with CertsForce

Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
Questions # 61:

You have used a newly released forensic investigation tool, which doesn‟t meet the Daubert T

est, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?

Options:

A.

The tool hasn‟t been tested by the International Standards Organization (ISO)


B.

Only the local law enforcement should use the tool


C.

The total has not been reviewed and accepted by your peers


D.

You are not certified for using the tool


Expert Solution
Questions # 62:

You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

Options:

A.

ARP Poisoning


B.

DNS Poisoning


C.

HTTP redirect attack


D.

IP Spoofing


Expert Solution
Questions # 63:

Which response organization tracks hoaxes as well as viruses?

Options:

A.

NIPC


B.

FEDCIRC


C.

CERT


D.

CIAC


Expert Solution
Questions # 64:

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the ______________ in order to track the emails back to the suspect.

Options:

A.

Routing Table


B.

Firewall log


C.

Configuration files


D.

Email Header


Expert Solution
Questions # 65:

Bob has been trying to penetrate a remote production system for the past tow weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However law enforcement agencies were recoding his every activity and this was later presented as evidence. The organization had used a Virtual Environment to trap BoB. What is a Virtual Environment?

Options:

A.

A Honeypot that traps hackers


B.

A system Using Trojaned commands


C.

An environment set up after the user logs in


D.

An environment set up before an user logs in


Expert Solution
Questions # 66:

Which of the following is NOT a graphics file?

Options:

A.

Picture1.tga


B.

Picture2.bmp


C.

Picture3.nfo


D.

Picture4.psd


Expert Solution
Questions # 67:

Which of the following filesystem is used by Mac OS X?

Options:

A.

EFS


B.

HFS+


C.

EXT2


D.

NFS


Expert Solution
Questions # 68:

If you discover a criminal act while investigating a corporate policy abuse, it becomes a public- sector investigation and should be referred to law enforcement?

Options:

A.

true


B.

false


Expert Solution
Questions # 69:

You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics laB. How many law-enforcement computer investigators should you request to staff the lab?

Options:

A.

8


B.

1


C.

4


D.

2


Expert Solution
Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions