ECCouncil 312-49v10 Practice Test - Questions Answers, Page 67
List of questions
Related questions
You are an information security analyst at a large pharmaceutical company. While performing a routine review of audit logs, you have noticed a significant amount of egress traffic to various IP addresses on destination port 22 during off- peak hours. You researched some of the IP addresses and found that many of them are in Eastern Europe. What is the most likely cause of this traffic?
Choose the layer in iOS architecture that provides frameworks for iOS app development?
Data density of a disk drive is calculated by using_______
Web browsers can store relevant information from user activities. Forensic investigators may retrieve files, lists, access history, cookies, among other digital footprints. Which tool can contribute to this task?
For the purpose of preserving the evidentiary chain of custody, which of the following labels is not appropriate?
This is a statement, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted. Which among the following is suitable for the above statement?
The information security manager at a national legal firm has received several alerts from the intrusion detection system that a known attack signature was detected against the organization's file server. What should the information security manager do first?
Which of the following is the most effective tool for acquiring volatile data from a Windows-based system?
Which of the following directory contains the binary files or executables required for system maintenance and administrative tasks on a Linux system?
Which set of anti-forensic tools/techniques allows a program to compress and/or encrypt an executable file to hide attack tools from being detected by reverse-engineering or scanning?
Question