ECCouncil 312-49v10 Practice Test - Questions Answers, Page 30
List of questions
Question 291
While looking through the IIS log file of a web server, you find the following entries:
What is evident from this log file?
Question 292
Why would you need to find out the gateway of a device when investigating a wireless attack?
Question 293
Using Internet logging software to investigate a case of malicious use of computers, the investigator comes across some entries that appear odd.
From the log, the investigator can see where the person in question went on the Internet. From the log, it appears that the user was manually typing in different user ID numbers. What technique this user was trying?
Question 294
Why would a company issue a dongle with the software they sell?
Question 295
What feature of Windows is the following command trying to utilize?
Question 296
Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying.
What term should Harold use?
Question 297
What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?
Question 298
Where is the startup configuration located on a router?
Question 299
While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h. What does this indicate on the computer?
Question 300
While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?
        
 
                                            
Question