ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 31

Add to Whishlist

List of questions

Question 301

Report Export Collapse

When reviewing web logs, you see an entry for resource not found in the HTTP status code field.

What is the actual error code that you would see in the log for resource not found?

Become a Premium Member for full access
  Unlock Premium Member

Question 302

Report Export Collapse

What stage of the incident handling process involves reporting events?

Become a Premium Member for full access
  Unlock Premium Member

Question 303

Report Export Collapse

When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?

Become a Premium Member for full access
  Unlock Premium Member

Question 304

Report Export Collapse

What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?

Become a Premium Member for full access
  Unlock Premium Member

Question 305

Report Export Collapse

Which of the following is a list of recently used programs or opened files?

Become a Premium Member for full access
  Unlock Premium Member

Question 306

Report Export Collapse

Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?

Become a Premium Member for full access
  Unlock Premium Member

Question 307

Report Export Collapse

Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?

Become a Premium Member for full access
  Unlock Premium Member

Question 308

Report Export Collapse

Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?

Become a Premium Member for full access
  Unlock Premium Member

Question 309

Report Export Collapse

Which US law does the interstate or international transportation and receiving of child pornography fall under?

Become a Premium Member for full access
  Unlock Premium Member

Question 310

Report Export Collapse

Which network attack is described by the following statement?

"At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions