ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 26

Question list
Search
Search

Related questions











Where is the default location for Apache access logs on a Linux computer?

A.
usr/local/apache/logs/access_log
A.
usr/local/apache/logs/access_log
Answers
B.
bin/local/home/apache/logs/access_log
B.
bin/local/home/apache/logs/access_log
Answers
C.
usr/logs/access_log
C.
usr/logs/access_log
Answers
D.
logs/usr/apache/access_log
D.
logs/usr/apache/access_log
Answers
Suggested answer: A

Jacob is a computer forensics investigator with over 10 years experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob testimony in this case?

A.
Justification
A.
Justification
Answers
B.
Authentication
B.
Authentication
Answers
C.
Reiteration
C.
Reiteration
Answers
D.
Certification
D.
Certification
Answers
Suggested answer: B

How often must a company keep log files for them to be admissible in a court of law?

A.
All log files are admissible in court no matter their frequency
A.
All log files are admissible in court no matter their frequency
Answers
B.
Weekly
B.
Weekly
Answers
C.
Monthly
C.
Monthly
Answers
D.
Continuously
D.
Continuously
Answers
Suggested answer: D

What file is processed at the end of a Windows XP boot to initialize the logon dialog box?

A.
NTOSKRNL.EXE
A.
NTOSKRNL.EXE
Answers
B.
NTLDR
B.
NTLDR
Answers
C.
LSASS.EXE
C.
LSASS.EXE
Answers
D.
NTDETECT.COM
D.
NTDETECT.COM
Answers
Suggested answer: A

John is working on his company policies and guidelines. The section he is currently working on covers company documents; how they should be handled, stored, and eventually destroyed. John is concerned about the process whereby outdated documents are destroyed. What type of shredder should John write in the guidelines to be used when destroying documents?

A.
Strip-cut shredder
A.
Strip-cut shredder
Answers
B.
Cross-cut shredder
B.
Cross-cut shredder
Answers
C.
Cross-hatch shredder
C.
Cross-hatch shredder
Answers
D.
Cris-cross shredder
D.
Cris-cross shredder
Answers
Suggested answer: B

To check for POP3 traffic using Ethereal, what port should an investigator search by?

A.
143
A.
143
Answers
B.
25
B.
25
Answers
C.
110
C.
110
Answers
D.
125
D.
125
Answers
Suggested answer: C

When should an MD5 hash check be performed when processing evidence?

A.
After the evidence examination has been completed
A.
After the evidence examination has been completed
Answers
B.
On an hourly basis during the evidence examination
B.
On an hourly basis during the evidence examination
Answers
C.
Before and after evidence examination
C.
Before and after evidence examination
Answers
D.
Before the evidence examination has been completed
D.
Before the evidence examination has been completed
Answers
Suggested answer: C

At what layer does a cross site scripting attack occur on?

A.
Presentation
A.
Presentation
Answers
B.
Application
B.
Application
Answers
C.
Session
C.
Session
Answers
D.
Data Link
D.
Data Link
Answers
Suggested answer: B

Davidson Trucking is a small transportation company that has three local offices in Detroit Michigan.

Ten female employees that work for the company have gone to an attorney reporting that male employees repeatedly harassed them and that management did nothing to stop the problem.

Davidson has employee policies that outline all company guidelines, including awareness on harassment and how it will not be tolerated. When the case is brought to court, whom should the prosecuting attorney call upon for not upholding company policy?

A.
IT personnel
A.
IT personnel
Answers
B.
Employees themselves
B.
Employees themselves
Answers
C.
Supervisors
C.
Supervisors
Answers
D.
Administrative assistant in charge of writing policies
D.
Administrative assistant in charge of writing policies
Answers
Suggested answer: C

When searching through file headers for picture file formats, what should be searched to find a JPEG file in hexadecimal format?

A.
FF D8 FF E0 00 10
A.
FF D8 FF E0 00 10
Answers
B.
FF FF FF FF FF FF
B.
FF FF FF FF FF FF
Answers
C.
FF 00 FF 00 FF 00
C.
FF 00 FF 00 FF 00
Answers
D.
EF 00 EF 00 EF 00
D.
EF 00 EF 00 EF 00
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71