Pass the ECCouncil No Cert Assigned EC0-349 Questions and answers with CertsForce

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

A forensics investigator needs to copy data from a computer to some type of removable media so he can examine the information at another location. The problem is that the data is around 42GB in size. What type of removable media could the investigator use?

Options:

A.

Blu-Ray single-layer


B.

HD-DVD


C.

Blu-Ray dual-layer


D.

DVD-18


Expert Solution
Questions # 42:

The use of warning banners helps a company avoid litigation by overcoming an employees assumed _________ when connecting to the company intranet, network, or virtual private network (VPN) and will allow the company investigators to monitor, search, and retrievecompany? intranet, network, or virtual private network (VPN) and will allow the company? investigators to monitor, search, and retrieve information stored within the network.

Options:

A.

Right to work


B.

Right of free speech


C.

Right to Internet access


D.

Right of privacy


Expert Solution
Questions # 43:

While looking through the IIS log file of a web server, you find the following entries:

Question # 43

What is evident from this log file?

Options:

A.

Web bugs


B.

Cross site scripting


C.

Hidden fields


D.

SQL injection is possible


Expert Solution
Questions # 44:

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

Options:

A.

.email


B.

.mail


C.

.pst


D.

.doc


Expert Solution
Questions # 45:

You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company ITYou have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company? IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

Options:

A.

Network


B.

Transport


C.

Data Link


D.

Session


Expert Solution
Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions