최신 EC0-349 무료덤프 - EC-COUNCIL Computer Hacking Forensic Investigator
What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?
정답: D
What file structure database would you expect to find on floppy disks?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers?hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?
정답: B
Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?
정답: B
You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities:
When you type this and click on search, you receive a pop-up window that says:
"This is a test."
What is the result of this test?
When you type this and click on search, you receive a pop-up window that says:
"This is a test."
What is the result of this test?
정답: A
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
정답: D
Computer forensics report provides detailed information on complete computer forensics investigation process. It should explain how the incident occurred, provide technical details of the incident and should be clear to understand. Which of the following attributes of a forensics report can render it inadmissible in a court of law?
정답: D
After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet.
Why is that?
Why is that?
정답: B
WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?
정답: C
Lance wants to place a honeypot on his network. Which of the following would be your recommendations?
정답: B
Shortcuts are the files with the extension .Ink that are created and are accessed by the users.
These files provide you with information about:
These files provide you with information about:
정답: A
What is a first sector ("sector zero") of a hard disk?
정답: D
In what circumstances would you conduct searches without a warrant?
정답: A
The ARP table of a router comes in handy for Investigating network attacks, as the table contains IP addresses associated with the respective MAC addresses.
The ARP table can be accessed using the __________command in Windows 7.
The ARP table can be accessed using the __________command in Windows 7.
정답: C
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document.
What is that code called?
What is that code called?
정답: B
Which device in a wireless local area network (WLAN) determines the next network point to which a packet should be forwarded toward its destination?
정답: B
Buffer Overflow occurs when an application writes more data to a block of memory, or buffer, than the buffer is allocated to hold. Buffer overflow attacks allow an attacker to modify the
_______________in order to control the process execution, crash the process and modify internal variables.
_______________in order to control the process execution, crash the process and modify internal variables.
정답: A