ECCouncil 312-49v10 Practice Test - Questions Answers, Page 30
List of questions
Related questions
While looking through the IIS log file of a web server, you find the following entries:
What is evident from this log file?
Why would you need to find out the gateway of a device when investigating a wireless attack?
Using Internet logging software to investigate a case of malicious use of computers, the investigator comes across some entries that appear odd.
From the log, the investigator can see where the person in question went on the Internet. From the log, it appears that the user was manually typing in different user ID numbers. What technique this user was trying?
Why would a company issue a dongle with the software they sell?
What feature of Windows is the following command trying to utilize?
Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying.
What term should Harold use?
What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?
Where is the startup configuration located on a router?
While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h. What does this indicate on the computer?
While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?
Question