2018 Jan ECCouncil Official New Released 312-49v8
100% Free Download! 100% Pass Guaranteed!

ECCouncil Computer Hacking Forensic Investigator (V8)

Question No: 111

Hash injection attack allows attackers to inject a compromised hash into a local session and use the hash to validate network resources.

  1. True

  2. False

Answer: A

Question No: 112

Smith, as a part his forensic investigation assignment, has seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith found that the SIM was protected by a Personal identification Number (PIN) code but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He unsuccessfully tried three PIN numbers that blocked the SIM card. What Jason can do in this scenario to reset the PIN and access SIM data?

  1. He should contact the device manufacturer for a Temporary Unlock Code (TUK) to gain access to the SIM

  2. He cannot access the SIM data in this scenario as the network operators or device manufacturers have no idea about a device PIN

  3. He should again attempt PIN guesses after a time of 24 hours

  4. He should ask the network operator for Personal Unlock Number (PUK) to gain access to the SIM

Answer: D

Question No: 113

Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.

  1. True

  2. False

Answer: A

Question No: 114

A swap file is a space on a hard disk used as the virtual memory extension of a computer#39;s RAM. Where is the hidden swap file in Windows located?

  1. C:\pagefile.sys

  2. C:\hiberfil.sys

  3. C:\config.sys

  4. C:\ALCSetup.log

Answer: A

Question No: 115

Which of the following reports are delivered under oath to a board of directors/managers/panel of jury?

  1. Written informal Report

  2. Verbal Formal Report

  3. Written Formal Report

  4. Verbal Informal Report

Answer: B

Question No: 116

Dumpster Diving refers to:

  1. Searching for sensitive information in the user#39;s trash bins and printer trash bins, and searching the user#39;s desk for sticky notes

  2. Looking at either the user#39;s keyboard or screen while he/she is logging in

  3. Convincing people to reveal the confidential information

  4. Creating a set of dictionary words and names, and trying all the possible combinations to crack the password

Answer: A

Question No: 117

If the partition size Is 4 GB, each cluster will be 32 K. Even If a file needs only 10 K, the entire 32 K will be allocated, resulting In 22 K of .

  1. Slack space

  2. Deleted space

  3. Cluster space

  4. Sector space

Answer: A

Question No: 118

Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi networks?

  1. WarWalking

  2. WarFlying

  3. WarChalking

  4. WarDhving

Answer: C

Question No: 119

Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data.

  1. True

  2. False

Answer: A

Question No: 120

Identify the attack from following sequence of actions?

Step 1: A user logs in to a trusted site and creates a new session

Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser

Step 3: The user is tricked to visit a malicious site

Step 4: the malicious site sends a request from the user#39;s browser using his session cookie

  1. Web Application Denial-of-Service (DoS) Attack

  2. Cross-Site Scripting (XSS) Attacks

  3. Cross-Site Request Forgery (CSRF) Attack

  4. Hidden Field Manipulation Attack

Answer: C

100% Free Download!
Download Free Demo:312-49v8 Demo PDF
100% Pass Guaranteed!
Download 2018 Latesttests 312-49v8 Full Exam PDF and VCE

Latesttests ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2018 Latesttests IT Certification PDF and VCE