Free 312-49 Exam Braindumps (page: 6)

Page 5 of 133

A(n)__________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

  1. blackout attack
  2. automated attack
  3. distributed attack
  4. central processing attack

Answer(s): B



The offset in a hexadecimal code is:

  1. The last byte after the colon
  2. The 0x at the beginning of the code
  3. The 0x at the end of the code
  4. The first byte after the colon

Answer(s): B



It takes _________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?

  1. by law, three
  2. quite a few
  3. only one
  4. at least two

Answer(s): C



With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

  1. 0
  2. 10
  3. 100
  4. 1

Answer(s): A






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Discussions & Posts