Free 312-49 Exam Braindumps (page: 35)

Page 34 of 133

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

  1. HKEY_LOCAL_MACHINE\hardware\windows\start
  2. HKEY_LOCAL_USERS\Software\Microsoft\old\Version\Load
  3. HKEY_CURRENT_USER\Microsoft\Default
  4. HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run

Answer(s): D



Which of the following file system is used by Mac OS X?

  1. EFS
  2. HFS+
  3. EXT2
  4. NFS

Answer(s): B



When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

  1. Passive IDS
  2. Active IDS
  3. Progressive IDS
  4. NIPS

Answer(s): B



Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

  1. Send DOS commands to crash the DNS servers
  2. Perform DNS poisoning
  3. Perform a zone transfer
  4. Enumerate all the users in the domain

Answer(s): C






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Discussions & Posts