ECCouncil 312-49v9 - Computer Hacking Forensic Investigator (v9)
Which of the following statements is TRUE about SQL Server error logs?
Which of these Windows utility help you to repair logical file system errors?
Shane, a forensic specialist, is investigating an ongoing attack on a MySQL database server hosted on a Windows machine with SID “WIN-ABCDE12345F.†Which of the following log file will help Shane in tracking all the client connections and activities performed on the database server?
Which among the following web application threats is resulted when developers expose various internal implementation objects, such as files, directories, database records, or key-through references?
Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?
Which of the following information is displayed when Netstat is used with -ano switch?
Which of the following statements is incorrect when preserving digital evidence?
In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?
Which of the following is a non-zero data that an application allocates on a hard disk cluster in systems running on Windows OS?
Amelia has got an email from a well-reputed company stating in the subject line that she has won a prize money, whereas the email body says that she has to pay a certain amount for being eligible for the contest. Which of the following acts does the email breach?
%3cscript%3ealert(â€XXXXXXXXâ€)%3c/script%3e is a script obtained from a Cross-Site Scripting attack. What type of encoding has the attacker employed?
Which component in the hard disk moves over the platter to read and write information?
CAN-SPAM act requires that you:
During an investigation, Noel found the following SIM card from the suspect's mobile. What does the code 89 44 represent?

Tasklist command displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer. Which of the following tasklist commands provides information about the listed processes, including the image name, PID, name, and number of the session for the process?
