ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 58

Add to Whishlist

List of questions

Question 571

Report Export Collapse

Which U.S. law sets the rules for sending emails for commercial purposes, establishes the minimum requirements for commercial messaging, gives the recipients of emails the right to ask the senders to stop emailing them, and spells out the penalties in case the above said rules are violated?

Become a Premium Member for full access
  Unlock Premium Member

Question 572

Report Export Collapse

Which of the following statements is TRUE about SQL Server error logs?

Become a Premium Member for full access
  Unlock Premium Member

Question 573

Report Export Collapse

Which among the following tools can help a forensic investigator to access the registry files during postmortem analysis?

Become a Premium Member for full access
  Unlock Premium Member

Question 574

Report Export Collapse

Consider that you are investigating a machine running an Windows OS released prior to Windows Vist a. You are trying to gather information about the deleted files by examining the master database file named INFO2 located at C:

\Recycler\\. You read an entry named "Dd5.exe". What does Dd5.exe mean?

Become a Premium Member for full access
  Unlock Premium Member

Question 575

Report Export Collapse

Which Linux command when executed displays kernel ring buffers or information about device drivers loaded into the kernel?

Become a Premium Member for full access
  Unlock Premium Member

Question 576

Report Export Collapse

A section of your forensics lab houses several electrical and electronic equipment. Which type of fire extinguisher you must install in this area to contain any fire incident?

Become a Premium Member for full access
  Unlock Premium Member

Question 577

Report Export Collapse

Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?

Become a Premium Member for full access
  Unlock Premium Member

Question 578

Report Export Collapse

In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?

Become a Premium Member for full access
  Unlock Premium Member

Question 579

Report Export Collapse

POP3 is an Internet protocol, which is used to retrieve emails from a mail server. Through which port does an email client connect with a POP3 server?

Become a Premium Member for full access
  Unlock Premium Member

Question 580

Report Export Collapse

James, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, James reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did James successfully execute?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions