Eccouncil Computer Hacking Forensic Investigator V10 312-49 Exam Questions

Page: 1 / 14
Total 704 questions
Question 1

Cylie is investigating a network breach at a state organization in Florid

a. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company PBX system be called?



Answer : A


Question 2

Sectors are pie-shaped regions on a hard disk that store dat

a. Which of the following parts of a hard disk do not contribute in determining the addresses of data?



Answer : B


Question 3

Tasklist command displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer. Which of the following tasklist commands provides information about the listed processes, including the image name, PID, name, and number of the session for the process?



Answer : B


Question 4

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?



Answer : D


Question 5

Event correlation is the process of finding relevance between the events that produce a final result. What type of correlation will help an organization to correlate events across a set of servers, systems, routers and network?



Answer : C


Question 6

BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains a header, the RGBQUAD array, information header, and image dat

a. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?



Answer : A


Question 7

Which among the following web application threats is resulted when developers expose various internal implementation objects, such as files, directories, database records, or key-through references?



Answer : C


Page:    1 / 14   
Total 704 questions