ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?

A.
Detection
A.
Detection
Answers
B.
Hearsay
B.
Hearsay
Answers
C.
Spoliation
C.
Spoliation
Answers
D.
Discovery
D.
Discovery
Answers
Suggested answer: D

The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be?

A.
Any data not yet flushed to the system will be lost
A.
Any data not yet flushed to the system will be lost
Answers
B.
All running processes will be lost
B.
All running processes will be lost
Answers
C.
The /tmp directory will be flushed
C.
The /tmp directory will be flushed
Answers
D.
Power interruption will corrupt the pagefile
D.
Power interruption will corrupt the pagefile
Answers
Suggested answer: A

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.

A.
Routing Table
A.
Routing Table
Answers
B.
Firewall log
B.
Firewall log
Answers
C.
Configuration files
C.
Configuration files
Answers
D.
Email Header
D.
Email Header
Answers
Suggested answer: D

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

A.
HKEY_LOCAL_MACHINE\hardware\windows\start
A.
HKEY_LOCAL_MACHINE\hardware\windows\start
Answers
B.
HKEY_LOCAL_USERS\Software\Microsoft\old\Version\Load
B.
HKEY_LOCAL_USERS\Software\Microsoft\old\Version\Load
Answers
C.
HKEY_CURRENT_USER\Microsoft\Default
C.
HKEY_CURRENT_USER\Microsoft\Default
Answers
D.
HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run
D.
HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run
Answers
Suggested answer: D

Which of the following file system is used by Mac OS X?

A.
EFS
A.
EFS
Answers
B.
HFS+
B.
HFS+
Answers
C.
EXT2
C.
EXT2
Answers
D.
NFS
D.
NFS
Answers
Suggested answer: B

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

A.
Passive IDS
A.
Passive IDS
Answers
B.
Active IDS
B.
Active IDS
Answers
C.
Progressive IDS
C.
Progressive IDS
Answers
D.
NIPS
D.
NIPS
Answers
Suggested answer: B

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

A.
Send DOS commands to crash the DNS servers
A.
Send DOS commands to crash the DNS servers
Answers
B.
Perform DNS poisoning
B.
Perform DNS poisoning
Answers
C.
Perform a zone transfer
C.
Perform a zone transfer
Answers
D.
Enumerate all the users in the domain
D.
Enumerate all the users in the domain
Answers
Suggested answer: C

What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = '[email protected]'; DROP TABLE members; --'

A.
Deletes the entire members table
A.
Deletes the entire members table
Answers
B.
Inserts the Error! Reference source not found.email address into the members table
B.
Inserts the Error! Reference source not found.email address into the members table
Answers
C.
Retrieves the password for the first user in the members table
C.
Retrieves the password for the first user in the members table
Answers
D.
This command will not produce anything since the syntax is incorrect
D.
This command will not produce anything since the syntax is incorrect
Answers
Suggested answer: A

You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame.

What ports should you open for SNMP to work through Firewalls? (Choose two.)

A.
162
A.
162
Answers
B.
161
B.
161
Answers
C.
163
C.
163
Answers
D.
160
D.
160
Answers
Suggested answer: A, B

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says: "This is a test." What is the result of this test?

A.
Your website is vulnerable to CSS
A.
Your website is vulnerable to CSS
Answers
B.
Your website is not vulnerable
B.
Your website is not vulnerable
Answers
C.
Your website is vulnerable to SQL injection
C.
Your website is vulnerable to SQL injection
Answers
D.
Your website is vulnerable to web bugs
D.
Your website is vulnerable to web bugs
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71