최신 EC0-349 무료덤프 - EC-COUNCIL Computer Hacking Forensic Investigator

A computer forensic report is a report which provides detailed information on the complete forensics investigation process.

정답: A
You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

정답: C
On Linux/Unix based Web servers, what privilege should the daemon service be run under?

정답: D
Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser Step 3: The user is tricked to visit a malicious site Step 4: the malicious site sends a request from the user's browser using his session cookie

정답: A
Shortcuts are the files with the extension .Ink that are created and are accessed by the users.
These files provide you with information about:

정답: A
During an investigation, an employee was found to have deleted harassing emails that were sent to someone else. The company was using Microsoft Exchange and had message tracking enabled. Where could the investigator search to find the message tracking log file on the Exchange server?

정답: C
Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic format should Travis send this report?

정답: A
When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts _______________ in the first letter position of the filename in the FAT database.

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Where is the startup configuration located on a router?

정답: B
Which one of the following statements is not correct while preparing for testimony?

정답: B
If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

정답: D
First responder is a person who arrives first at the crime scene and accesses the victim's computer system after the incident. He or She is responsible for protecting, integrating, and preserving the evidence obtained from the crime scene. Which of the following is not a role of first responder?

정답: B
What is a good security method to prevent unauthorized users from "tailgating"?

정답: D
File signature analysis involves collecting information from the __________ of a file to determine the type and function of the file

정답: C
How many sectors will a 125 KB file use in a FAT32 file system?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network.
Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

정답: A

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기