Pass the ECCouncil No Cert Assigned EC0-349 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

What type of attack sends SYN requests to a target system with spoofed IP addresses?

Options:

A.

SYN flood


B.

Ping of death


C.

Cross site scripting


D.

Land


Questions # 2:

With regard to using an antivirus scanner during a computer forensics investigation, you should:

Options:

A.

Scan the suspect hard drive before beginning an investigation


B.

Never run a scan on your forensics workstation because it could change your system configurationNever run a scan on your forensics workstation because it could change your system? configuration


C.

Scan your forensics workstation at intervals of no more than once every five minutes during an investigation


D.

Scan your forensics workstation before beginning an investigation


Questions # 3:

To preserve digital evidence, an investigator should ____________

Options:

A.

Make two copies of each evidence item using a single imaging tool


B.

Make a single copy of each evidence item using an approved imaging tool


C.

Make two copies of each evidence item using different imaging tools


D.

Only store the original evidence item


Questions # 4:

How often must a company keep log files for them to be admissible in a court of law?

Options:

A.

All log files are admissible in court no matter their frequency


B.

Weekly


C.

Monthly


D.

Continuously


Questions # 5:

Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers?hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?

Options:

A.

Place PDA, including all devices, in an antistatic bag


B.

Unplug all connected devices


C.

Power off all devices if currently on


D.

Photograph and document the peripheral devices


Questions # 6:

What method of copying should always be performed first before carrying out an investigation?

Options:

A.

Parity-bit copy


B.

Bit-stream copy


C.

MS-DOS disc copy


D.

System level copy


Questions # 7:

What is the slave device connected to the secondary IDE controller on a Linux OS referred to?

Options:

A.

hda


B.

hdd


C.

hdb


D.

hdc


Questions # 8:

Davidson Trucking is a small transportation company that has three local offices in Detroit Michigan. Ten female employees that work for the company have gone to an attorney reporting that male employees repeatedly harassed them and that management did nothing to stop the problem. Davidson has employee policies that outline all company guidelines, including awareness on harassment and how it will not be tolerated. When the case is brought to court, whom should the prosecuting attorney call upon for not upholding company policy?

Options:

A.

IT personnel


B.

Employees themselves


C.

Supervisors


D.

Administrative assistant in charge of writing policies


Questions # 9:

What will the following command accomplish? dd if=/dev/xxx of=mbr.backup bs=512 count=1

Options:

A.

Back up the master boot record


B.

Restore the master boot record


C.

Mount the master boot record on the first partition of the hard drive


D.

Restore the first 512 bytes of the first partition of the hard drive


Questions # 10:

What technique is used by JPEGs for compression?

Options:

A.

ZIP


B.

TCD


C.

DCT


D.

TIFF-8


Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions