Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-49v10 Practice Exam with Questions & Answers | Set: 13

Questions 181

John is working on his company policies and guidelines. The section he is currently working on covers company documents; how they should be handled, stored, and eventually destroyed. John is concerned about the process whereby outdated documents are destroyed. What type of shredder should John write in the guidelines to be used when destroying documents?

Options:
A.

Strip-cut shredder

B.

Cross-cut shredder

C.

Cross-hatch shredder

D.

Cris-cross shredder

ECCouncil 312-49v10 Premium Access
Questions 182

Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic format should Travis send this report?

Options:
A.

TIFF-8

B.

DOC

C.

WPD

D.

PDF

Questions 183

Ivanovich, a forensics investigator, is trying to extract complete information about running processes from a system. Where should he look apart from the RAM and virtual memory?

Options:
A.

Swap space

B.

Application data

C.

Files and documents

D.

Slack space

Questions 184

Which among the following files provides email header information in the Microsoft Exchange server?

Options:
A.

gwcheck.db

B.

PRIV.EDB

C.

PUB.EDB

D.

PRIV.STM

Questions 185

Amber, a black hat hacker, has embedded a malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?

Options:
A.

Click-jacking

B.

Compromising a legitimate site

C.

Spearphishing

D.

Malvertising

Questions 186

In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?

Options:
A.

Security Administrator

B.

Network Administrator

C.

Director of Information Technology

D.

Director of Administration

Questions 187

Which of the following tool can the investigator use to analyze the network to detect Trojan activities?

Options:
A.

Regshot

B.

TRIPWIRE

C.

RAM Computer

D.

Capsa

Questions 188

NTFS has reduced slack space than FAT, thus having lesser potential to hide data in the slack space. This is because:

Options:
A.

FAT does not index files

B.

NTFS is a journaling file system

C.

NTFS has lower cluster size space

D.

FAT is an older and inefficient file system

Questions 189

Where are files temporarily written in Unix when printing?

Options:
A.

/usr/spool

B.

/var/print

C.

/spool

D.

/var/spool

Questions 190

After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

Options:
A.

RestrictAnonymous must be set to "10" for complete security

B.

RestrictAnonymous must be set to "3" for complete security

C.

RestrictAnonymous must be set to "2" for complete security

D.

There is no way to always prevent an anonymous null session from establishing

Questions 191

What advantage does the tool Evidor have over the built-in Windows search?

Options:
A.

It can find deleted files even after they have been physically removed

B.

It can find bad sectors on the hard drive

C.

It can search slack space

D.

It can find files hidden within ADS

Questions 192

Why would you need to find out the gateway of a device when investigating a wireless attack?

Options:
A.

The gateway will be the IP of the proxy server used by the attacker to launch the attack

B.

The gateway will be the IP of the attacker computer

C.

The gateway will be the IP used to manage the RADIUS server

D.

The gateway will be the IP used to manage the access point

Questions 193

What hashing method is used to password protect Blackberry devices?

Options:
A.

AES

B.

RC5

C.

MD5

D.

SHA-1

Questions 194

Which of the following options will help users to enable or disable the last access time on a system running Windows 10 OS?

Options:
A.

wmic service

B.

Reg.exe

C.

fsutil

D.

Devcon

Questions 195

The investigator wants to examine changes made to the system’s registry by the suspect program. Which of the following tool can help the investigator?

Options:
A.

TRIPWIRE

B.

RAM Capturer

C.

Regshot

D.

What’s Running