Free 312-49v10 Exam Braindumps (page: 5)

Page 5 of 171

What type of attack occurs when an attacker can force a router to stop forwarding packets by ooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

  1. digital attack
  2. denial of service
  3. physical attack
  4. ARP redirect

Answer(s): B



When examining a le with a Hex Editor, what space does the le header occupy?

  1. the last several bytes of the le
  2. the rst several bytes of the le
  3. none, le headers are contained in the FAT
  4. one byte at the beginning of the le

Answer(s): D



In the context of le deletion process, which of the following statement holds true?


  1. When les are deleted, the data is overwritten and the cluster marked as available
  2. The longer a disk is in use, the less likely it is that deleted les will be overwritten
  3. While booting, the machine may create temporary les that can delete evidence
  4. Secure delete programs work by completely overwriting the le in one go

Answer(s): C



A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded.
What can the investigator do to prove the violation?

  1. Image the disk and try to recover deleted les
  2. Seek the help of co-workers who are eye-witnesses
  3. Check the Windows registry for connection data (you may or may not recover)
  4. Approach the websites for evidence

Answer(s): A






Post your Comments and Discuss EC-Council 312-49v10 exam with other Community members:

312-49v10 Exam Discussions & Posts