Free 312-49 Exam Braindumps (page: 5)

Page 4 of 133

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

  1. digital attack
  2. denial of service
  3. physical attack
  4. ARP redirect

Answer(s): B



When examining a file with a Hex Editor, what space does the file header occupy?

  1. the last several bytes of the file
  2. the first several bytes of the file
  3. none, file headers are contained in the FAT
  4. one byte at the beginning of the file

Answer(s): D



In the context of file deletion process, which of the following statement holds true?

  1. When files are deleted, the data is overwritten and the cluster marked as available
  2. The longer a disk is in use, the less likely it is that deleted files will be overwritten
  3. While booting, the machine may create temporary files that can delete evidence
  4. Secure delete programs work by completely overwriting the file in one go

Answer(s): C



A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation?

  1. Image the disk and try to recover deleted files
  2. Seek the help of co-workers who are eye-witnesses
  3. Check the Windows registry for connection data (you may or may not recover)
  4. Approach the websites for evidence

Answer(s): A






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Discussions & Posts