ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











While looking through the IIS log file of a web server, you find the following entries:

What is evident from this log file?

A.
Web bugs
A.
Web bugs
Answers
B.
Cross site scripting
B.
Cross site scripting
Answers
C.
Hidden fields
C.
Hidden fields
Answers
D.
SQL injection is possible
D.
SQL injection is possible
Answers
Suggested answer: D

Why would you need to find out the gateway of a device when investigating a wireless attack?

A.
The gateway will be the IP of the proxy server used by the attacker to launch the attack
A.
The gateway will be the IP of the proxy server used by the attacker to launch the attack
Answers
B.
The gateway will be the IP of the attacker computer
B.
The gateway will be the IP of the attacker computer
Answers
C.
The gateway will be the IP used to manage the RADIUS server
C.
The gateway will be the IP used to manage the RADIUS server
Answers
D.
The gateway will be the IP used to manage the access point
D.
The gateway will be the IP used to manage the access point
Answers
Suggested answer: D

Using Internet logging software to investigate a case of malicious use of computers, the investigator comes across some entries that appear odd.

From the log, the investigator can see where the person in question went on the Internet. From the log, it appears that the user was manually typing in different user ID numbers. What technique this user was trying?

A.
Parameter tampering
A.
Parameter tampering
Answers
B.
Cross site scripting
B.
Cross site scripting
Answers
C.
SQL injection
C.
SQL injection
Answers
D.
Cookie Poisoning
D.
Cookie Poisoning
Answers
Suggested answer: A

Why would a company issue a dongle with the software they sell?

A.
To provide source code protection
A.
To provide source code protection
Answers
B.
To provide wireless functionality with the software
B.
To provide wireless functionality with the software
Answers
C.
To provide copyright protection
C.
To provide copyright protection
Answers
D.
To ensure that keyloggers cannot be used
D.
To ensure that keyloggers cannot be used
Answers
Suggested answer: C

What feature of Windows is the following command trying to utilize?

A.
White space
A.
White space
Answers
B.
AFS
B.
AFS
Answers
C.
ADS
C.
ADS
Answers
D.
Slack file
D.
Slack file
Answers
Suggested answer: C

Harold is finishing up a report on a case of network intrusion, corporate spying, and embezzlement that he has been working on for over six months. He is trying to find the right term to use in his report to describe network-enabled spying.

What term should Harold use?

A.
Spycrack
A.
Spycrack
Answers
B.
Spynet
B.
Spynet
Answers
C.
Netspionage
C.
Netspionage
Answers
D.
Hackspionage
D.
Hackspionage
Answers
Suggested answer: C

What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?

A.
Copyright
A.
Copyright
Answers
B.
Design patent
B.
Design patent
Answers
C.
Trademark
C.
Trademark
Answers
D.
Utility patent
D.
Utility patent
Answers
Suggested answer: D

Where is the startup configuration located on a router?

A.
Static RAM
A.
Static RAM
Answers
B.
BootROM
B.
BootROM
Answers
C.
NVRAM
C.
NVRAM
Answers
D.
Dynamic RAM
D.
Dynamic RAM
Answers
Suggested answer: C

While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h. What does this indicate on the computer?

A.
The files have been marked as hidden
A.
The files have been marked as hidden
Answers
B.
The files have been marked for deletion
B.
The files have been marked for deletion
Answers
C.
The files are corrupt and cannot be recovered
C.
The files are corrupt and cannot be recovered
Answers
D.
The files have been marked as read-only
D.
The files have been marked as read-only
Answers
Suggested answer: B

While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?

A.
Technical material related to forensics
A.
Technical material related to forensics
Answers
B.
No particular field
B.
No particular field
Answers
C.
Judging the character of defendants/victims
C.
Judging the character of defendants/victims
Answers
D.
Legal issues
D.
Legal issues
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71