ECCouncil 312-49v10 Practice Test - Questions Answers, Page 7
List of questions
Question 61
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
Question 62
What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?
Question 63
Which response organization tracks hoaxes as well as viruses?
Question 64
Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?
Question 65
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?
Question 66
What TCP/UDP port does the toolkit program netstat use?
Question 67
Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
Question 68
In a FAT32 system, a 123 KB file will use how many sectors?
Question 69
You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?
Question 70
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
Question