ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Related questions











What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?

A.
ICMP header field
A.
ICMP header field
Answers
B.
TCP header field
B.
TCP header field
Answers
C.
IP header field
C.
IP header field
Answers
D.
UDP header field
D.
UDP header field
Answers
Suggested answer: B

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?

A.
forensic duplication of hard drive
A.
forensic duplication of hard drive
Answers
B.
analysis of volatile data
B.
analysis of volatile data
Answers
C.
comparison of MD5 checksums
C.
comparison of MD5 checksums
Answers
D.
review of SIDs in the Registry
D.
review of SIDs in the Registry
Answers
Suggested answer: C

Which response organization tracks hoaxes as well as viruses?

A.
NIPC
A.
NIPC
Answers
B.
FEDCIRC
B.
FEDCIRC
Answers
C.
CERT
C.
CERT
Answers
D.
CIAC
D.
CIAC
Answers
Suggested answer: D

Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

A.
18 U.S.C. 1029
A.
18 U.S.C. 1029
Answers
B.
18 U.S.C. 1362
B.
18 U.S.C. 1362
Answers
C.
18 U.S.C. 2511
C.
18 U.S.C. 2511
Answers
D.
18 U.S.C. 2703
D.
18 U.S.C. 2703
Answers
Suggested answer: A

Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?

A.
the Microsoft Virtual Machine Identifier
A.
the Microsoft Virtual Machine Identifier
Answers
B.
the Personal Application Protocol
B.
the Personal Application Protocol
Answers
C.
the Globally Unique ID
C.
the Globally Unique ID
Answers
D.
the Individual ASCII String
D.
the Individual ASCII String
Answers
Suggested answer: C

What TCP/UDP port does the toolkit program netstat use?

A.
Port 7
A.
Port 7
Answers
B.
Port 15
B.
Port 15
Answers
C.
Port 23
C.
Port 23
Answers
D.
Port 69
D.
Port 69
Answers
Suggested answer: B

Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

A.
18 U.S.C. 1029 Possession of Access Devices
A.
18 U.S.C. 1029 Possession of Access Devices
Answers
B.
18 U.S.C. 1030 Fraud and related activity in connection with computers
B.
18 U.S.C. 1030 Fraud and related activity in connection with computers
Answers
C.
18 U.S.C. 1343 Fraud by wire, radio or television
C.
18 U.S.C. 1343 Fraud by wire, radio or television
Answers
D.
18 U.S.C. 1361 Injury to Government Property
D.
18 U.S.C. 1361 Injury to Government Property
Answers
E.
18 U.S.C. 1362 Government communication systems
E.
18 U.S.C. 1362 Government communication systems
Answers
F.
18 U.S.C. 1831 Economic Espionage Act
F.
18 U.S.C. 1831 Economic Espionage Act
Answers
G.
18 U.S.C. 1832 Trade Secrets Act
G.
18 U.S.C. 1832 Trade Secrets Act
Answers
Suggested answer: B

In a FAT32 system, a 123 KB file will use how many sectors?

A.
34
A.
34
Answers
B.
25
B.
25
Answers
C.
11
C.
11
Answers
D.
56
D.
56
Answers
Suggested answer: B

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

A.
The registry
A.
The registry
Answers
B.
The swap file
B.
The swap file
Answers
C.
The recycle bin
C.
The recycle bin
Answers
D.
The metadata
D.
The metadata
Answers
Suggested answer: B

When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?

A.
a write-blocker
A.
a write-blocker
Answers
B.
a protocol analyzer
B.
a protocol analyzer
Answers
C.
a firewall
C.
a firewall
Answers
D.
a disk editor
D.
a disk editor
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71