Free 312-49V9 Exam Braindumps (page: 15)

Page 15 of 122

When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.

  1. 4902
  2. 3902
  3. 4904
  4. 3904

Answer(s): A



MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network

  1. 16-bit address
  2. 24-bit address
  3. 32-bit address
  4. 48-bit address

Answer(s): D



Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, "X" represents the _________.

  1. Drive name
  2. Sequential number
  3. Original file name's extension
  4. Original file name

Answer(s): A



Wireless access control attacks aim to penetrate a network by evading WLAN access control measures, such as AP MAC filters and Wi-Fi port access controls.
Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure the employees of the organization to connect to it?

  1. War driving
  2. Rogue access points
  3. MAC spoofing
  4. Client mis-association

Answer(s): D



Page 15 of 122



Post your Comments and Discuss EC-Council 312-49V9 exam with other Community members:

Olu commented on October 16, 2023
Question 235: 22,164 x 80 x 63 x 512 = 57.19 GB
UNITED STATES
upvote