ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 28

Add to Whishlist

List of questions

Question 271

Report Export Collapse

Which program is the bootloader when Windows XP starts up?

Become a Premium Member for full access
  Unlock Premium Member

Question 272

Report Export Collapse

What encryption technology is used on Blackberry devices Password Keeper?

Become a Premium Member for full access
  Unlock Premium Member

Question 273

Report Export Collapse

What is the first step taken in an investigation for laboratory forensic staff members?

Become a Premium Member for full access
  Unlock Premium Member

Question 274

Report Export Collapse

What type of analysis helps to identify the time and sequence of events in an investigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 275

Report Export Collapse

Cylie is investigating a network breach at a state organization in Florid a. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company PBX system be called?

Become a Premium Member for full access
  Unlock Premium Member

Question 276

Report Export Collapse

What will the following command accomplish in Linux? fdisk /dev/hda

Become a Premium Member for full access
  Unlock Premium Member

Question 277

Report Export Collapse

In the following email header, where did the email first originate from?

ECCouncil 312-49v10 image Question 277 24303 09182024185459000000

Become a Premium Member for full access
  Unlock Premium Member

Question 278

Report Export Collapse

A computer forensics investigator is inspecting the firewall logs for a large financial institution that has employees working 24 hours a day, 7 days a week.

ECCouncil 312-49v10 image Question 278 24304 09182024185459000000

What can the investigator infer from the screenshot seen below?

Become a Premium Member for full access
  Unlock Premium Member

Question 279

Report Export Collapse

When investigating a wireless attack, what information can be obtained from the DHCP logs?

Become a Premium Member for full access
  Unlock Premium Member

Question 280

Report Export Collapse

This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court.

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71

Related questions