Computer Hacking Forensic Investigator (CHFI-v10) 온라인 연습
최종 업데이트 시간: 2024년11월08일
당신은 온라인 연습 문제를 통해 EC-Council 312-49v10 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 312-49v10 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 601개의 시험 문제와 답을 포함하십시오.
/ 7
Question No : 1
When obtaining a warrant, it is important to:
정답:
Question No : 2
Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.
Bill protects the PDF documents with a password and sends them to their intended recipients.
Why PDF passwords do not offer maximum protection?
정답:
Question No : 3
Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document .
What is that code called?
정답:
Question No : 4
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
정답:
Question No : 5
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting .
Why did this ping sweep only produce a few responses?
정답:
Question No : 6
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected .
What are two common methods used by password cracking software that you can use to obtain the password?
정답:
Question No : 7
What file structure database would you expect to find on floppy disks?
정답:
Question No : 8
You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive .
Which of the following formats correctly specifies these sectors?
정답:
Question No : 9
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
정답:
Question No : 10
What are the security risks of running a "repair" installation for Windows XP?
정답:
Question No : 11
How many bits is Source Port Number in TCP Header packet?
정답:
Question No : 12
When examining a file with a Hex Editor, what space does the file header occupy?
정답:
Question No : 13
How many sectors will a 125 KB file use in a FAT32 file system?
정답:
Question No : 14
To preserve digital evidence, an investigator should ____________________.
정답:
Question No : 15
E-mail logs contain which of the following information to help you in your investigation? (Choose four.)