ECCouncil 312-49v10 Practice Test - Questions Answers, Page 31
List of questions
Related questions
When reviewing web logs, you see an entry for resource not found in the HTTP status code field.
What is the actual error code that you would see in the log for resource not found?
What stage of the incident handling process involves reporting events?
When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?
What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?
Which of the following is a list of recently used programs or opened files?
Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?
Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?
Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?
Which US law does the interstate or international transportation and receiving of child pornography fall under?
Which network attack is described by the following statement?
"At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."
Question