[Free] 2019(Nov) EnsurePass ECCouncil 312-49v8 Dumps with VCE and PDF 21-30

Get Full Version of the Exam
http://www.EnsurePass.com/312-49v8.html

Question No.21

Physical security recommendations: There should be only one entrance to a forensics lab.

  1. True

  2. False

Correct Answer: A

Question No.22

Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses to transfer log messages in a clear text format.

  1. TCP

  2. FTP

  3. SMTP

  4. POP

Correct Answer: A

Question No.23

Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server#39;s root directory?

  1. Unvalidated input

  2. Parameter/form tampering

  3. Directory traversal

  4. Security misconfiguration

Correct Answer: C

Question No.24

Raw data acquisition format creates of a data set or suspect drive.

  1. Simple sequential flat files

  2. Segmented files

  3. Compressed image files

  4. Segmented image files

Correct Answer: A

Question No.25

When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on.

  1. True

  2. False

Correct Answer: B

Question No.26

Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications. Which data compression technique maintains data integrity?

  1. Lossless compression

  2. Lossy compression

  3. Speech encoding compression

  4. Lossy video compression

Correct Answer: A

Question No.27

Which of the following commands shows you the names of all open shared files on a server and

number of file locks on each file?

  1. Net sessions

  2. Net file

  3. Netconfig

  4. Net share

Correct Answer: B

Question No.28

Who is responsible for the following tasks?

image

Secure the scene and ensure that it is maintained In a secure state until the Forensic Team advises

image

Make notes about the scene that will eventually be handed over to the Forensic Team

  1. Non-Laboratory Staff

  2. System administrators

  3. Local managers or other non-forensic staff

  4. Lawyers

Correct Answer: A

Question No.29

Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc. Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?

  1. IP address spoofing

  2. Man-in-the-middle attack

  3. Denial of Service attack

  4. Session sniffing

Correct Answer: A

Question No.30

A mobile operating system is the operating system that operates a mobile device like a mobile phone, smartphone, PDA, etc. It determines the functions and features available on mobile devices such as keyboards, applications, email, text messaging, etc. Which of the following mobile operating systems is free and open source?

  1. Web OS

  2. Android

  3. Apple IOS

  4. Symbian OS

Correct Answer: B

Get Full Version of the Exam
312-49v8 Dumps
312-49v8 VCE and PDF

Leave a Reply