ECCouncil 312-49v10 Practice Test - Questions Answers, Page 30

List of questions
Question 291

While looking through the IIS log file of a web server, you find the following entries:
What is evident from this log file?
Question 292

Why would you need to find out the gateway of a device when investigating a wireless attack?
Question 293

Using Internet logging software to investigate a case of malicious use of computers, the investigator comes across some entries that appear odd.
From the log, the investigator can see where the person in question went on the Internet. From the log, it appears that the user was manually typing in different user ID numbers. What technique this user was trying?
Question 294

Why would a company issue a dongle with the software they sell?
Question 295

What feature of Windows is the following command trying to utilize?
Question 296

Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying.
What term should Harold use?
Question 297

What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?
Question 298

Where is the startup configuration located on a router?
Question 299

While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h. What does this indicate on the computer?
Question 300

While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?
Question