ECCouncil 312-49v10 Practice Test - Questions Answers, Page 44

List of questions
Question 431

Rusty, a computer forensics apprentice, uses the command nbtstat -c while analyzing the network information in a suspect system. What information is he looking for?
Question 432

Gary, a computer technician, is facing allegations of abusing children online by befriending them and sending them illicit adult images from his office computer. What type of investigation does this case require?
Question 433

The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux. Identify the Apache error log from the following logs.
Question 434

Tasklist command displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer. Which of the following tasklist commands provides information about the listed processes, including the image name, PID, name, and number of the session for the process?
Question 435

Which part of Metasploit framework helps users to hide the data related to a previously deleted file or currently unused by the allocated file.
Question 436

Which one of the following is not a first response procedure?
Question 437

Graphics Interchange Format (GIF) is a ____ RGB bitmap image format for images with up to 256 distinct colors per frame.
Question 438

Hard disk data addressing is a method of allotting addresses to each _______ of data on a hard disk.
Question 439

Which of the following standard represents a legal precedent regarding the admissibility of scientific examinations or experiments in legal cases?
Question 440

Event correlation is the process of finding relevance between the events that produce a final result.
What type of correlation will help an organization to correlate events across a set of servers, systems, routers and network?
Question