ECCouncil 312-49v10 Practice Test - Questions Answers, Page 71
List of questions
Related questions
Robert needs to copy an OS disk snapshot of a compromised VM to a storage account in different region for further investigation. Which of the following should he use in this scenario?
A.
Azure CLI
B.
Azure Monitor
C.
Azure Active Directory
D.
Azure Portal
Which of the following is a requirement for senders as per the CAN-SPAM act?
A.
Senders cannot use misleading or false header information
B.
Senders should never share their physical postal address in the email
C.
Senders must use deceptive subject lines
D.
Emails must not contain information regarding how to stop receiving emails from the sender in future
Before accessing digital evidence from victims, witnesses, or suspects, on their electronic devices, what should the Investigator do first to respect legal privacy requirements?
A.
Notify the fact to the local authority or employer
B.
Remove the battery or turn-off the device
C.
Protect the device against external communication
D.
Obtain formal written consent to search
You are the incident response manager at a regional bank. While performing routine auditing of web application logs, you find several attempted login submissions that contain the following strings:
What kind of attack has occurred?
A.
SQL injection
B.
Buffer overflow
C.
Cross-size scripting
D.
Cross-size request forgery
Question