[Free] 2018(Jan) Dumps4cert Examcollection ECCouncil 312-49v8 Dumps with VCE and PDF 81-90

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan ECCouncil Official New Released 312-49v8
100% Free Download! 100% Pass Guaranteed!

ECCouncil Computer Hacking Forensic Investigator (V8)

Question No: 81

Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to cause a denial-of-service attack?

  1. Email spamming

  2. Mail bombing

  3. Phishing

  4. Email spoofing

Answer: B

Question No: 82

Which of the following file in Novel GroupWise stores information about user accounts?

  1. ngwguard.db

  2. gwcheck.db



Answer: A

Question No: 83

Digital evidence is not fragile in nature.

  1. True

  2. False

Answer: B

Question No: 84

Which of the following log injection attacks uses white space padding to create unusual log entries?

  1. Word wrap abuse attack

  2. HTML injection attack

  3. Terminal injection attack

  4. Timestamp injection attack

Answer: A

Question No: 85

Which of the following is not correct when documenting an electronic crime scene?

  1. Document the physical scene, such as the position of the mouse and the location of components near the system

  2. Document related electronic components that are difficult to find

  3. Record the condition of the computer system, storage media, electronic devices and conventional evidence, including power status of the computer

  4. Write down the color of shirt and pant the suspect was wearing

Answer: D

Question No: 86

Under no circumstances should anyone, with the exception of qualified computer forensics personnel, make any attempts to restore or recover information from a computer system or device that holds electronic information.

  1. True

  2. False

Answer: A

Question No: 87

Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses to transfer log messages in a clear text format.

  1. TCP

  2. FTP

  3. SMTP

  4. POP

Answer: A

Question No: 88

An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes).

Which property of the image shows you the number of colors available for each pixel in an image?

  1. Pixel

  2. Bit Depth

  3. File Formats

  4. Image File Size

Answer: B

Question No: 89

Which of the following statements is incorrect related to acquiring electronic evidence at crime scene?

  1. Sample banners are used to record the system activities when used by the unauthorized user

  2. In warning banners, organizations give clear and unequivocal notice to intruders that by signing onto the system they are expressly consenting to such monitoring

  3. The equipment is seized which is connected to the case, knowing the role of the computer which will indicate what should be taken

  4. At the time of seizing process, you need to shut down the computer immediately

Answer: D

Question No: 90

Depending upon the Jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?

A. 18 USC 7029

B. 18 USC 7030

C. 18 USC 7361

D. 18 USC 7371

Answer: B

100% Dumps4cert Free Download!
Download Free Demo:312-49v8 Demo PDF
100% Dumps4cert Free Guaranteed!
312-49v8 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No