Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?
> NMAP -sn 192.168.11.200-215 The NMAP command above performs which of the following?
Joshua is analyzing an MSSQL database for finding the attack evidence and other details, where should he look for the database logs?
Which forensic investigation methodology believes that criminals commit crimes solely to benefit their criminal enterprises?
What does the Rule 101 of Federal Rules of Evidence states?
James is dealing with a case regarding a cybercrime that has taken place in Arizona, USA. James needs to lawfully seize the evidence from an electronic device without affecting the user's anonymity. Which of the following law should he comply with, before retrieving the evidence?
As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?
You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?
James, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, James reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did James successfully execute?
In which implementation of RAID will the image of a Hardware RAID volume be different from the image taken separately from the disks?
Which of the following is NOT an anti-forensics technique?
An investigator is analyzing a checkpoint firewall log and comes across symbols. What type of log is he looking at?
Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?
Which list contains the most recent actions performed by a Windows User?
For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
ECCouncil Free Exams |
---|
![]() |