Pass the ECCouncil No Cert Assigned EC0-349 Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation, the CEO informs them that the incident will be classified as ow level? How long will the team have to respond to the incident?the investigation, the CEO informs them that the incident will be classified as ?ow level? How long will the team have to respond to the incident?

Options:

A.

One working day


B.

Two working days


C.

Immediately


D.

Four hours


Expert Solution
Questions # 12:

Where does Encase search to recover NTFS files and folders?

Options:

A.

MBR


B.

MFT


C.

Slack space


D.

HAL


Expert Solution
Questions # 13:

When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz?format, what does the nnn?denote?When marking evidence that has been collected with the ?aa/ddmmyy/nnnn/zz?format, what does the ?nnn?denote?

Options:

A.

The year the evidence was taken


B.

The sequence number for the parts of the same exhibit


C.

The initials of the forensics analyst


D.

The sequential number of the exhibits seized


Expert Solution
Questions # 14:

Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?

22,164 cylinders/disk

80 heads/cylinder

63 sectors/track

Options:

A.

53.26 GB


B.

57.19 GB


C.

11.17 GB


D.

10 GB


Expert Solution
Questions # 15:

At what layer does a cross site scripting attack occur on?

Options:

A.

Presentation


B.

Application


C.

Session


D.

Data Link


Expert Solution
Questions # 16:

John is working on his company policies and guidelines. The section he is currently working on covers company documents; how they shouldJohn is working on his company? policies and guidelines. The section he is currently working on covers company documents; how they should be handled, stored, and eventually destroyed. John is concerned about the process whereby outdated documents are destroyed. What type of shredder should John write in the guidelines to be used when destroying documents?

Options:

A.

Strip-cut shredder


B.

Cross-cut shredder


C.

Cross-hatch shredder


D.

Cris-cross shredder


Expert Solution
Questions # 17:

George was recently fired from his job as an IT analyst at Pitts and Company in Dallas Texas. His main duties as an analyst were to support the company Active Directory structure and to create network polices. George now wants to break into the company network by cracking some ofcompany? Active Directory structure and to create network polices. George now wants to break into the company? network by cracking some of the service accounts he knows about. Which password cracking technique should George use in this situation?

Options:

A.

Brute force attack


B.

Syllable attack


C.

Rule-based attack


D.

Dictionary attack


Expert Solution
Questions # 18:

Which is a standard procedure to perform during all computer forensics investigations?

Options:

A.

With the hard drive in the suspect PC, check the date and time in the system CMOSWith the hard drive in the suspect PC, check the date and time in the system? CMOS


B.

With the hard drive removed from the suspect PC, check the date and time in the system CMOSWith the hard drive removed from the suspect PC, check the date and time in the system? CMOS


C.

With the hard drive in the suspect PC, check the date and time in the File Allocation Table


D.

With the hard drive removed from the suspect PC, check the date and time in the system RAMWith the hard drive removed from the suspect PC, check the date and time in the system? RAM


Expert Solution
Questions # 19:

What must an investigator do before disconnecting an iPod from any type of computer?

Options:

A.

Unmount the iPod


B.

Mount the iPod


C.

Disjoin the iPod


D.

Join the iPod


Expert Solution
Questions # 20:

What is one method of bypassing a system BIOS password?

Options:

A.

Removing the processor


B.

Removing the CMOS battery


C.

Remove all the system memoryRemove all the system? memory


D.

Login to Windows and disable the BIOS password


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions