ECCouncil 312-49v10 Practice Test - Questions Answers, Page 28

List of questions
Question 271

Which program is the bootloader when Windows XP starts up?
Question 272

What encryption technology is used on Blackberry devices Password Keeper?
Question 273

What is the first step taken in an investigation for laboratory forensic staff members?
Question 274

What type of analysis helps to identify the time and sequence of events in an investigation?
Question 275

Cylie is investigating a network breach at a state organization in Florid a. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company PBX system be called?
Question 276

What will the following command accomplish in Linux? fdisk /dev/hda
Question 277

In the following email header, where did the email first originate from?
Question 278

A computer forensics investigator is inspecting the firewall logs for a large financial institution that has employees working 24 hours a day, 7 days a week.
What can the investigator infer from the screenshot seen below?
Question 279

When investigating a wireless attack, what information can be obtained from the DHCP logs?
Question 280

This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court.
Question