Eccouncil 312-49 Computer Hacking Forensic Investigator Exam Practice Test

Page: 1 / 14
Total 486 questions
Question 1

What will the following command produce on a website login page?

SELECT email, passwd, login_id, full_name FROM members

WHERE email = 'someone@somehwere.com';

DROP TABLE members; --'



Answer : C


Question 2

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?



Answer : C


Question 3

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets



Answer : B


Question 4

What operating system would respond to the following command? C:\> nmap -sW 10.10.145.65



Answer : C


Question 5

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive footprinting against their Web servers. What tool should you use?



Answer : C


Question 6

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?



Answer : B


Question 7

Software firewalls work at which layer of the OSI model?



Answer : C


Page:    1 / 14   
Total 486 questions