Free 312-49 Exam Braindumps (page: 23)

Page 22 of 133

What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?

  1. A compressed file
  2. A Data stream file
  3. An encrypted file
  4. A reserved file

Answer(s): B



An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

  1. EFS uses a 128-bit key that can't be cracked, so you will not be able to recover the information
  2. When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information.
  3. The EFS Revoked Key Agent can be used on the Computer to recover the information
  4. When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.

Answer(s): B



When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

  1. Recycle Bin
  2. MSDOS.sys
  3. BIOS
  4. Case files

Answer(s): A



You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected. What are two common methods used by password cracking software that you can use to obtain the password?

  1. Limited force and library attack
  2. Brute Force and dictionary Attack
  3. Maximum force and thesaurus Attack
  4. Minimum force and appendix Attack

Answer(s): B






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Discussions & Posts