ECCouncil Computer Hacking Forensic Investigator (V9)
201.What advantage does the tool Evidor have over the built-in Windows search? A. It can find deleted files even after they have been physically removed B. It can find bad sectors on the hard drive C. It can search slack space D. It can find files hidden within ADS - answer-c 202.Which of the following tool enables a user to reset his/her lost admin password in a Windows system? A. Advanced Office Password Recovery B. Active@ Password Changer C. Smartkey Password Recovery Bundle Standard D. Passware Kit Forensic - answer-b 203.Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it? A. Ad hoc associations B. Client mis-association C. MAC spoofing D. Rogue access points - answer-d 204.P is a virtual memory file used to expand the physical memory of a computer. Select the registry path for the page file : A. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management B. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerSystem Management C. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerDevice Management D. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementPrefetchParameters - answer-A 205.Which program is the bootloader when Windows XP starts up? A. KERNEL.EXE B. NTLDR C. LOADER D. LILO - answer-b 206.Which among the following files provides email header information in the Microsoft Exchange server? A. B. PRIV.EDB C. PUB.EDB D. PRIV.STM - answer-The message tracking log is a text-based log file that contains information about email messages as they pass through the Exchange Server. It includes details such as the sender and recipient addresses, message subject, date and time sent, and message delivery status. The message tracking log is used to troubleshoot email delivery issues, as well as to perform message forensics and compliance audits. 207.Steven has been given the task of designing a computer forensics lab for the company he works for. He has found documentation on all aspects of how to design a lab except the number of exits needed. How many exits should Steven include in his design for the computer forensics lab? A. Three
Escuela, estudio y materia
- Institución
- ECCouncil Computer Hacking Forensic Investigator (
- Grado
- ECCouncil Computer Hacking Forensic Investigator (
Información del documento
- Subido en
- 21 de junio de 2024
- Número de páginas
- 19
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
eccouncil computer hacking forensic investigator