Pass the ECCouncil ECSA EC0-479 Questions and answers with CertsForce

Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
Questions # 61:

The MD5 program is used to:

Options:

A.

wipe magnetic media before recycling it


B.

make directories on a evidence disk


C.

view graphics files on an evidence drive


D.

verify that a disk is not altered when you examine it


Expert Solution
Questions # 62:

If you come across a sheepdip machine at your client site, what would you infer?

Options:

A.

Asheepdip coordinates several honeypots


B.

Asheepdip computer is another name for a honeypot


C.

Asheepdip computer is used only for virus-checking.


D.

Asheepdip computer defers a denial of service attack


Expert Solution
Questions # 63:

In General, ______________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the datA.

Options:

A.

Network Forensics


B.

Data Recovery


C.

Disaster Recovery


D.

Computer Forensics


Expert Solution
Questions # 64:

What happens when a file is deleted by a Microsoft operating system using the FAT file system?

Options:

A.

only the reference to the file is removed from the FAT


B.

the file is erased and cannot be recovered


C.

a copy of the file is stored and the original file is erased


D.

the file is erased but can be recovered


Expert Solution
Questions # 65:

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

Options:

A.

the same log is used at all times


B.

a new log file is created everyday


C.

a new log file is created each week


D.

a new log is created each time the Web Server is started


Expert Solution
Questions # 66:

In Microsoft file structures, sectors are grouped together to form:

Options:

A.

Clusters


B.

Drives


C.

Bitstreams


D.

Partitions


Expert Solution
Questions # 67:

The newer Macintosh Operating System is based on:

Options:

A.

OS/2


B.

BSD Unix


C.

Linux


D.

Microsoft Windows


Expert Solution
Questions # 68:

Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?

Options:

A.

bench warrant


B.

wire tap


C.

subpoena


D.

search warrant


Expert Solution
Questions # 69:

How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?

Options:

A.

128


B.

64


C.

32


D.

16


Expert Solution
Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions