Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-49v9 Practice Exam with Questions & Answers | Set: 5

Questions 61

Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?

Options:
A.

Typography

B.

Steganalysis

C.

Picture encoding

D.

Steganography

ECCouncil 312-49v9 Premium Access
Questions 62

Which password cracking technique uses every possible combination of character sets?

Options:
A.

Rainbow table attack

B.

Brute force attack

C.

Rule-based attack

D.

Dictionary attack

Questions 63

Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?

Options:
A.

Portable Document Format

B.

Advanced Forensics Format (AFF)

C.

Proprietary Format

D.

Raw Format

Questions 64

Which of the following tool enables a user to reset his/her lost admin password in a Windows system?

Options:
A.

Advanced Office Password Recovery

B.

Active@ Password Changer

C.

Smartkey Password Recovery Bundle Standard

D.

Passware Kit Forensic

Questions 65

Why would you need to find out the gateway of a device when investigating a wireless attack?

Options:
A.

The gateway will be the IP of the proxy server used by the attacker to launch the attack

B.

The gateway will be the IP of the attacker computer

C.

The gateway will be the IP used to manage the RADIUS server

D.

The gateway will be the IP used to manage the access point

Questions 66

Which of the following tool can the investigator use to analyze the network to detect Trojan activities?

Options:
A.

Regshot

B.

TRIPWIRE

C.

RAM Computer

D.

Capsa

Questions 67

All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?

Options:
A.

Blackberry Message Center

B.

Microsoft Exchange

C.

Blackberry WAP gateway

D.

Blackberry WEP gateway

Questions 68

Where does Encase search to recover NTFS files and folders?

Options:
A.

MBR

B.

MFT

C.

Slack space

D.

HAL

Questions 69

In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

Options:
A.

The change in the routing fabric to bypass the affected router

B.

More RESET packets to the affected router to get it to power back up

C.

RESTART packets to the affected router to get it to power back up

D.

STOP packets to all other routers warning of where the attack originated

Questions 70

Jack Smith is a forensics investigator who works for Mason Computer Investigation Services. He is investigating a computer that was infected by Ramen Virus.

312-49v9 Question 70

He runs the netstat command on the machine to see its current connections. In the following screenshot, what do the 0.0.0.0 IP addresses signify?

 

Options:
A.

Those connections are established

B.

Those connections are in listening mode

C.

Those connections are in closed/waiting mode

D.

Those connections are in timed out/waiting mode

Questions 71

Why would a company issue a dongle with the software they sell?

Options:
A.

To provide source code protection

B.

To provide wireless functionality with the software

C.

To provide copyright protection

D.

To ensure that keyloggers cannot be used

Questions 72

Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network?

Options:
A.

Block all internal MAC address from using SNMP

B.

Block access to UDP port 171

C.

Block access to TCP port 171

D.

Change the default community string names

Questions 73

On an Active Directory network using NTLM authentication, where on the domain controllers are the passwords stored?

Options:
A.

SAM

B.

AMS

C.

Shadow file

D.

Password.conf

Questions 74

What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?

Options:
A.

Fraggle

B.

Smurf scan

C.

SYN flood

D.

Teardrop

Questions 75

Which of the following tool creates a bit-by-bit image of an evidence media?

Options:
A.

Recuva

B.

FileMerlin

C.

AccessData FTK Imager

D.

Xplico