ECCouncil 312-49v10 Practice Test - Questions Answers, Page 32

List of questions
Question 311

Which of the following tool captures and allows you to interactively browse the traffic on a network?
Question 312

Which of the following standard represents a legal precedent sent in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses' testimony during federal legal proceedings?
Question 313

Which of the following stages in a Linux boot process involve initialization of the system's hardware?
Question 314

Who is responsible for the following tasks?
Question 315

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?
Question 316

You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at the sessions the machine has opened with other systems?
Question 317

Watson, a forensic investigator, is examining a copy of an ISO file stored in CDFS format. What type of evidence is this?
Question 318

Which of the following techniques can be used to beat steganography?
Question 319

Which of the following options will help users to enable or disable the last access time on a system running Windows 10 OS?
Question 320

Bob has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drives. he wants to recover all those data, which includes his personal photos, music, documents, videos, official email, etc. Which of the following tools shall resolve Bob's purpose?
Question