Pass the ECCouncil No Cert Assigned EC0-349 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Where is the default location for Apache access logs on a Linux computer?

Options:

A.

usr/local/apache/logs/access_log


B.

bin/local/home/apache/logs/access_log


C.

usr/logs/access_log


D.

logs/usr/apache/access_log


Expert Solution
Questions # 22:

When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?

Options:

A.

Write-blocker


B.

Protocol analyzer


C.

Firewall


D.

Disk editor


Expert Solution
Questions # 23:

What file is processed at the end of a Windows XP boot to initialize the logon dialog box?

Options:

A.

NTOSKRNL.EXE


B.

NTLDR


C.

LSASS.EXE


D.

NTDETECT.COM


Expert Solution
Questions # 24:

During the course of a corporate investigation, you find that an employee is committing a federal crime. Can the employer file a criminal complain with the police?

Options:

A.

Yes, and all evidence can be turned over to the police


B.

Yes, but only if you turn the evidence over to a district judge


C.

No, because the investigation was conducted without following standard police procedures


D.

No, because the investigation was conducted without a warrant


Expert Solution
Questions # 25:

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?

Options:

A.

Copyright law


B.

Brandmark law


C.

Trademark law


D.

Printright law


Expert Solution
Questions # 26:

What encryption technology is used on Blackberry devices?Password Keeper?

Options:

A.

3DES


B.

AES


C.

Blowfish


D.

RC5


Expert Solution
Questions # 27:

Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?

Options:

A.

Network


B.

Transport


C.

Physical


D.

Data Link


Expert Solution
Questions # 28:

While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?

Options:

A.

Technical material related to forensics


B.

No particular field


C.

Judging the character of defendants/victims


D.

Legal issues


Expert Solution
Questions # 29:

In the following email header, where did the email first originate from?

Question # 29

Options:

A.

Somedomain.com


B.

Smtp1.somedomain.com


C.

Simon1.state.ok.gov.us


D.

David1.state.ok.gov.us


Expert Solution
Questions # 30:

What is the name of the standard Linux command that can be used to create bit-stream images?

Options:

A.

mcopy


B.

image


C.

MD5


D.

dd


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions