[Free] 2019(Nov) EnsurePass ECCouncil 312-49v8 Dumps with VCE and PDF 91-100

Get Full Version of the Exam
http://www.EnsurePass.com/312-49v8.html

Question No.91

Data files from original evidence should be used for forensics analysis

  1. True

  2. False

Correct Answer: B

Question No.92

Attacker uses vulnerabilities in the authentication or session management functions such as exposed accounts, session IDs, logout, password management, timeouts, remember me. secret question, account update etc. to impersonate users, if a user simply closes the browser without logging out from sites accessed through a public computer, attacker can use the same browser later and exploit the user#39;s privileges. Which of the following vulnerability/exploitation is referred above?

  1. Session ID in URLs

  2. Timeout Exploitation

  3. I/O exploitation

  4. Password Exploitation

Correct Answer: B

Question No.93

Mobile phone forensics is the science of recovering digital evidence from a mobile phone under forensically sound conditions.

  1. True

  2. False

Correct Answer: A

Question No.94

What is the first step that needs to be carried out to crack the password?

  1. A word list is created using a dictionary generator program or dictionaries

  2. The list of dictionary words is hashed or encrypted

  3. The hashed wordlist is compared against the target hashed password, generally one word at a time

  4. If it matches, that password has been cracked and the password cracker displays the unencrypted version of the password

Correct Answer: A

Question No.95

When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID .

A.

4902

B.

3902

C.

4904

D.

3904

Correct Answer: A

Question No.96

Which of the following commands shows you the NetBIOS name table each?

image

  1. Option A

  2. Option B

  3. Option C

  4. Option D

Correct Answer: A

Question No.97

Deposition enables opposing counsel to preview an expert witness#39;s testimony at trial. Which of the following deposition is not a standard practice?

  1. Both attorneys are present

  2. Only one attorneys is present

  3. No jury or judge

  4. Opposing counsel asks questions

Correct Answer: B

Question No.98

WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?

  1. RC4-CCMP

  2. RC4-TKIP

  3. AES-CCMP

  4. AES-TKIP

Correct Answer: C

Question No.99

When collecting evidence from the RAM, where do you look for data?

  1. Swap file

  2. SAM file

  3. Data file

  4. Log file

Correct Answer: A

Question No.100

Hard disk data addressing is a method of allotting addresses to each of data on a hard disk

  1. Physical block

  2. Logical block

  3. Operating system block

  4. Hard disk block

Correct Answer: A

Get Full Version of the Exam
312-49v8 Dumps
312-49v8 VCE and PDF