New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-49v9 Practice Exam with Questions & Answers | Set: 4

Questions 46

What will the following URL produce in an unpatched IIS Web Server?

http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\

Options:
A.

Directory listing of C: drive on the web server

B.

Insert a Trojan horse into the C: drive of the web server

C.

Execute a buffer flow in the C: drive of the web server

D.

Directory listing of the C:\windows\system32 folder on the web server

ECCouncil 312-49v9 Premium Access
Questions 47

The offset in a hexadecimal code is:

Options:
A.

The last byte after the colon

B.

The 0x at the beginning of the code

C.

The 0x at the end of the code

D.

The first byte after the colon

Questions 48

You are working in the security Department of law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?

Options:
A.

10

B.

25

C.

110

D.

135

Questions 49

The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company's intranet, network or Virtual Private Network(VPN) and will allow the company's investigators to monitor, search and retrieve information stored within the network.

Options:
A.

Right to work

B.

Right of free speech

C.

Right to Internet Access

D.

Right of Privacy

Questions 50

You should make at least how many bit-stream copies of a suspect drive?

Options:
A.

1

B.

2

C.

3

D.

4

Questions 51

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

Options:
A.

The registry

B.

The swap file

C.

The recycle bin

D.

The metadata

Questions 52

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.

Bill protects the PDF documents with a password and sends them to their intended recipients.

Why PDF passwords do not offer maximum protection?

Options:
A.

PDF passwords can easily be cracked by software brute force tools

B.

PDF passwords are converted to clear text when sent through E-mail

C.

PDF passwords are not considered safe by Sarbanes-Oxley

D.

When sent through E-mail, PDF passwords are stripped from the document completely

Questions 53

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?

Options:
A.

70 years

B.

the life of the author

C.

the life of the author plus 70 years

D.

copyrights last forever

Questions 54

Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold? needs?

Options:
A.

Circuit-level proxy firewall

B.

Packet filtering firewall

C.

Application-level proxy firewall

D.

Data link layer firewall

Questions 55

Printing under a Windows Computer normally requires which one of the following files types to be created?

Options:
A.

EME

B.

MEM

C.

EMF

D.

CME

Questions 56

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?

Options:
A.

Poison the DNS records with false records

B.

Enumerate MX and A records from DNS

C.

Establish a remote connection to the Domain Controller

D.

Enumerate domain user accounts and built-in groups

Questions 57

In a FAT32 system, a 123 KB file will use how many sectors?

Options:
A.

34

B.

25

C.

11

D.

56

Questions 58

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

Options:
A.

Cached password hashes for the past 20 users

B.

Service account passwords in plain text

C.

IAS account names and passwords

D.

Local store PKI Kerberos certificates

Questions 59

What TCP/UDP port does the toolkit program netstat use?

Options:
A.

Port 7

B.

Port 15

C.

Port 23

D.

Port 69

Questions 60

What will the following command accomplish?

dd if=/dev/xxx of=mbr.backup bs=512 count=1

Options:
A.

Back up the master boot record

B.

Restore the master boot record

C.

Mount the master boot record on the first partition of the hard drive

D.

Restore the first 512 bytes of the first partition of the hard drive