Pass the ECCouncil No Cert Assigned EC0-349 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into thecompany? firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the companycompany? phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company? PBX system be called?

Options:

A.

Phreaking


B.

Squatting


C.

Crunching


D.

Pretexting


Expert Solution
Questions # 32:

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question wheather evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

Options:

A.

Sign a statement attesting that the evidence is the same as it was when it entered the lab


B.

There is no reason to worry about this possible claim because state labs are certified


C.

Make MD5 hashes of the evidence and compare it to the standard database developed by NIST


D.

Make MD5 hashes of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab


Expert Solution
Questions # 33:

Where are files temporarily written in Unix when printing?

Options:

A.

/usr/spool


B.

/var/print


C.

/spool


D.

/var/spool


Expert Solution
Questions # 34:

Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?

Options:

A.

Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media


B.

Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence


C.

Connect the target media; Delete the system for acquisition; Secure the evidence; Copy the media


D.

Secure the evidence; Prepare the system for acquisition; Connect the target media; Copy the media


Expert Solution
Questions # 35:

What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?

Options:

A.

Copyright


B.

Design patent


C.

Trademark


D.

Utility patent


Expert Solution
Questions # 36:

When investigating a wireless attack, what information can be obtained from the DHCP logs?

Options:

A.

The operating system of the attacker and victim computersThe operating system of the attacker and victim? computers


B.

IP traffic between the attacker and the victim


C.

MAC address of the attacker


D.

If any computers on the network are running in promiscuous mode


Expert Solution
Questions # 37:

What feature of Windows is the following command trying to utilize?

Question # 37

Options:

A.

White space


B.

AFS


C.

ADS


D.

Slack file


Expert Solution
Questions # 38:

What type of analysis helps to identify the time and sequence of events in an investigation?

Options:

A.

Time-based


B.

Functional


C.

Relational


D.

Temporal


Expert Solution
Questions # 39:

The newer Macintosh Operating System (MacOS X) is based on:

Options:

A.

Microsoft Windows


B.

OS/2


C.

BSD Unix


D.

Linux


Expert Solution
Questions # 40:

Sectors in hard disks typically contain how many bytes?

Options:

A.

256


B.

512


C.

1024


D.

2048


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions