ECCouncil 312-49v10 Practice Test - Questions Answers, Page 31

List of questions
Question 301

When reviewing web logs, you see an entry for resource not found in the HTTP status code field.
What is the actual error code that you would see in the log for resource not found?
Question 302

What stage of the incident handling process involves reporting events?
Question 303

When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?
Question 304

What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?
Question 305

Which of the following is a list of recently used programs or opened files?
Question 306

Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?
Question 307

Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?
Question 308

Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?
Question 309

Which US law does the interstate or international transportation and receiving of child pornography fall under?
Question 310

Which network attack is described by the following statement?
"At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."
Question