Eccouncil 312-49 Computer Hacking Forensic Investigator V10 Exam Practice Test

Page: 1 / 14
Total 704 questions
Question 1

The information security manager at a national legal firm has received several alerts from the intrusion detection system that a known attack signature was detected against the organization's file server. What should the information security manager do first?



Answer : C


Question 2

In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?



Answer : A


Question 3

What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someone@somehwere.com'; DROP TABLE members; --'



Answer : A


Question 4

Which of the following data structures stores attributes of a process, as well as pointers to other attributes and data structures?



Answer : D


Question 5

In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?



Answer : D


Question 6

What encryption technology is used on Blackberry devices Password Keeper?



Answer : B


Question 7

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?



Answer : D


Page:    1 / 14   
Total 704 questions