Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with ValidTests

Exam 312-49v10 All Questions
Exam 312-49v10 Premium Access

View all detail and faqs for the 312-49v10 exam

Viewing page 4 out of 14 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following techniques can be used to beat steganography?

Options:

A.

Encryption

B.

Steganalysis

C.

Decryption

D.

Cryptanalysis

Expert Solution
Questions # 47:

Which of the following is a record of the characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups?

Options:

A.

Inode bitmap block

B.

Superblock

C.

Block bitmap block

D.

Data block

Expert Solution
Questions # 48:

Which MySQL log file contains information on server start and stop?

Options:

A.

Slow query log file

B.

General query log file

C.

Binary log

D.

Error log file

Expert Solution
Questions # 49:

An expert witness is a __________________ who is normally appointed by a party to assist the formulation and preparation of a party’s claim or defense.

Options:

A.

Expert in criminal investigation

B.

Subject matter specialist

C.

Witness present at the crime scene

D.

Expert law graduate appointed by attorney

Expert Solution
Questions # 50:

You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

Options:

A.

Network

B.

Transport

C.

Data Link

D.

Session

Expert Solution
Questions # 51:

What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?

Options:

A.

Every byte of the file(s) is given an MD5 hash to match against a master file

B.

Every byte of the file(s) is verified using 32-bit CRC

C.

Every byte of the file(s) is copied to three different hard drives

D.

Every byte of the file(s) is encrypted using three different methods

Expert Solution
Questions # 52:

Which of the following reports are delivered under oath to a board of directors/managers/panel of the jury?

Options:

A.

Written Formal Report

B.

Verbal Formal Report

C.

Verbal Informal Report

D.

Written Informal Report

Expert Solution
Questions # 53:

Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network?

Options:

A.

Block all internal MAC address from using SNMP

B.

Block access to UDP port 171

C.

Block access to TCP port 171

D.

Change the default community string names

Expert Solution
Questions # 54:

Which of the following files gives information about the client sync sessions in Google Drive on Windows?

Options:

A.

sync_log.log

B.

Sync_log.log

C.

sync.log

D.

Sync.log

Expert Solution
Questions # 55:

Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where “x” represents the ___________________.

Options:

A.

Drive name

B.

Original file name’s extension

C.

Sequential number

D.

Original file name

Expert Solution
Questions # 56:

Which password cracking technique uses every possible combination of character sets?

Options:

A.

Rainbow table attack

B.

Brute force attack

C.

Rule-based attack

D.

Dictionary attack

Expert Solution
Questions # 57:

This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court.

Options:

A.

Civil litigation testimony

B.

Expert testimony

C.

Victim advocate testimony

D.

Technical testimony

Expert Solution
Questions # 58:

What feature of Windows is the following command trying to utilize?

Question # 58

Options:

A.

White space

B.

AFS

C.

ADS

D.

Slack file

Expert Solution
Questions # 59:

What is considered a grant of a property right given to an individual who discovers or invents a new machine, process, useful composition of matter or manufacture?

Options:

A.

Copyright

B.

Design patent

C.

Trademark

D.

Utility patent

Expert Solution
Questions # 60:

Which of the following technique creates a replica of an evidence media?

Options:

A.

Data Extraction

B.

Backup

C.

Bit Stream Imaging

D.

Data Deduplication

Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 46-60 out of questions