ECCouncil 312-49 - Computer Hacking Forensic Investigator
Jason discovered a file named $RIYG6VR.doc in the C:\$Recycle.Bin\
During an investigation of an XSS attack, the investigator comes across the term “[a-zA-Z0-9\%]+†in analyzed evidence details. What is the expression used for?
Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies? What type of Penetration Testing is Larry planning to carry out?
Which of the following tools will help the investigator to analyze web server logs?
The process of restarting a computer that is already turned on through the operating system is called?
An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation, the CEO informs them that the incident will be classified as low level. How long will the team have to respond to the incident?
In Windows Security Event Log, what does an event id of 530 imply?
When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:
Amelia has got an email from a well-reputed company stating in the subject line that she has won a prize money, whereas the email body says that she has to pay a certain amount for being eligible for the contest. Which of the following acts does the email breach?
A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?
Where is the startup configuration located on a router?
A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?
%3cscript%3ealert(â€XXXXXXXXâ€)%3c/script%3e is a script obtained from a Cross-Site Scripting attack. What type of encoding has the attacker employed?
What type of attack sends SYN requests to a target system with spoofed IP addresses?
What binary coding is used most often for e-mail purposes?