ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 56

Question list
Search
Search

List of questions

Search

Related questions











What do you call the process of studying the changes that have taken place across a system or a machine after a series of actions or incidents?

A.
Windows Services Monitoring
A.
Windows Services Monitoring
Answers
B.
System Baselining
B.
System Baselining
Answers
C.
Start-up Programs Monitoring
C.
Start-up Programs Monitoring
Answers
D.
Host integrity Monitoring
D.
Host integrity Monitoring
Answers
Suggested answer: D

Self-Monitoring, Analysis, and Reporting Technology (SMART) is built into the hard drives to monitor and report system activity. Which of the following is included in the report generated by SMART?

A.
Power Off time
A.
Power Off time
Answers
B.
Logs of high temperatures the drive has reached
B.
Logs of high temperatures the drive has reached
Answers
C.
All the states (running and discontinued) associated with the OS
C.
All the states (running and discontinued) associated with the OS
Answers
D.
List of running processes
D.
List of running processes
Answers
Suggested answer: B

Data Files contain Multiple Data Pages, which are further divided into Page Header, Data Rows, and Offset Table. Which of the following is true for Data Rows?

A.
Data Rows store the actual data
A.
Data Rows store the actual data
Answers
B.
Data Rows present Page type. Page ID, and so on
B.
Data Rows present Page type. Page ID, and so on
Answers
C.
Data Rows point to the location of actual data
C.
Data Rows point to the location of actual data
Answers
D.
Data Rows spreads data across multiple databases
D.
Data Rows spreads data across multiple databases
Answers
Suggested answer: B

In Windows, prefetching is done to improve system performance. There are two types of prefetching: boot prefetching and application prefetching. During boot prefetching, what does the Cache Manager do?

A.
Determines the data associated with value EnablePrefetcher
A.
Determines the data associated with value EnablePrefetcher
Answers
B.
Monitors the first 10 seconds after the process is started
B.
Monitors the first 10 seconds after the process is started
Answers
C.
Checks whether the data is processed
C.
Checks whether the data is processed
Answers
D.
Checks hard page faults and soft page faults
D.
Checks hard page faults and soft page faults
Answers
Suggested answer: C

The MAC attributes are timestamps that refer to a time at which the file was last modified or last accessed or originally created. Which of the following file systems store MAC attributes in Coordinated Universal Time (UTC) format?

A.
File Allocation Table (FAT
A.
File Allocation Table (FAT
Answers
B.
New Technology File System (NTFS)
B.
New Technology File System (NTFS)
Answers
C.
Hierarchical File System (HFS)
C.
Hierarchical File System (HFS)
Answers
D.
Global File System (GFS)
D.
Global File System (GFS)
Answers
Suggested answer: B

Robert, a cloud architect, received a huge bill from the cloud service provider, which usually doesn't happen. After analyzing the bill, he found that the cloud resource consumption was very high. He then examined the cloud server and discovered that a malicious code was running on the server, which was generating huge but harmless traffic from the server. This means that the server has been compromised by an attacker with the sole intention to hurt the cloud customer financially. Which attack is described in the above scenario?

A.
XSS Attack
A.
XSS Attack
Answers
B.
DDoS Attack (Distributed Denial of Service)
B.
DDoS Attack (Distributed Denial of Service)
Answers
C.
Man-in-the-cloud Attack
C.
Man-in-the-cloud Attack
Answers
D.
EDoS Attack (Economic Denial of Service)
D.
EDoS Attack (Economic Denial of Service)
Answers
Suggested answer: B

What is the role of Alloc.c in Apache core?

A.
It handles allocation of resource pools
A.
It handles allocation of resource pools
Answers
B.
It is useful for reading and handling of the configuration files
B.
It is useful for reading and handling of the configuration files
Answers
C.
It takes care of all the data exchange and socket connections between the client and the server
C.
It takes care of all the data exchange and socket connections between the client and the server
Answers
D.
It handles server start-ups and timeouts
D.
It handles server start-ups and timeouts
Answers
Suggested answer: A

Which of the following statements is true regarding SMTP Server?

A.
SMTP Server breaks the recipient's address into Recipient's name and his/her designation before passing it to the DNS Server
A.
SMTP Server breaks the recipient's address into Recipient's name and his/her designation before passing it to the DNS Server
Answers
B.
SMTP Server breaks the recipient's address into Recipient's name and recipient's address before passing it to the DNS Server
B.
SMTP Server breaks the recipient's address into Recipient's name and recipient's address before passing it to the DNS Server
Answers
C.
SMTP Server breaks the recipient's address into Recipient's name and domain name before passing it to the DNS Server
C.
SMTP Server breaks the recipient's address into Recipient's name and domain name before passing it to the DNS Server
Answers
D.
SMTP Server breaks the recipient's address into Recipient's name and his/her initial before passing it to the DNS Server
D.
SMTP Server breaks the recipient's address into Recipient's name and his/her initial before passing it to the DNS Server
Answers
Suggested answer: C

Which ISO Standard enables laboratories to demonstrate that they comply with quality assurance and provide valid results?

A.
ISO/IEC 16025
A.
ISO/IEC 16025
Answers
B.
ISO/IEC 18025
B.
ISO/IEC 18025
Answers
C.
ISO/IEC 19025
C.
ISO/IEC 19025
Answers
D.
ISO/IEC 17025
D.
ISO/IEC 17025
Answers
Suggested answer: D

Which type of attack is possible when attackers know some credible information about the victim's password, such as the password length, algorithms involved, or the strings and characters used in its creation?

A.
Rule-Based Attack
A.
Rule-Based Attack
Answers
B.
Brute-Forcing Attack
B.
Brute-Forcing Attack
Answers
C.
Dictionary Attack
C.
Dictionary Attack
Answers
D.
Hybrid Password Guessing Attack
D.
Hybrid Password Guessing Attack
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71