ECCouncil 312-49v10 Practice Test - Questions Answers, Page 37
List of questions
Question 361

Which among the following files provides email header information in the Microsoft Exchange server?
Question 362

Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server's root directory?
Question 363

What is the size value of a nibble?
Question 364

Which of the following tool enables a user to reset his/her lost admin password in a Windows system?
Question 365

Which of the following acts as a network intrusion detection system as well as network intrusion prevention system?
Question 366

In Steganalysis, which of the following describes a Known-stego attack?
Question 367

Annie is searching for certain deleted files on a system running Windows XP OS. Where will she find the files if they were not completely deleted from the system?
Question 368

Which of the following files stores information about a local Google Drive installation such as User email ID, Local Sync Root Path, and Client version installed?
Question 369

An expert witness is a __________________ who is normally appointed by a party to assist the formulation and preparation of a party's claim or defense.
Question 370

Smith, a network administrator with a large MNC, was the first to arrive at a suspected crime scene involving criminal use of compromised computers. What should be his first response while maintaining the integrity of evidence?
Question