Free 312-49V9 Exam Braindumps (page: 32)

Page 32 of 122

Which of the following statements is incorrect when preserving digital evidence?

  1. Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals
  2. Verily if the monitor is in on, off, or in sleep mode
  3. Remove the power cable depending on the power state of the computer i.e., in on. off, or in sleep mode
  4. Turn on the computer and extract Windows event viewer log files

Answer(s): D



You can interact with the Registry through intermediate programs. Graphical user interface (GUI) Registry editors such as Regedit.exe or Regedt32 exe are commonly used as intermediate programs in Windows 7. Which of the following is a root folder of the registry editor?

  1. HKEY_USERS
  2. HKEY_LOCAL_ADMIN
  3. HKEY_CLASSES_ADMIN
  4. HKEY_CLASSES_SYSTEM

Answer(s): A



Which of the following is not an example of a cyber-crime?

  1. Fraud achieved by the manipulation of the computer records
  2. Firing an employee for misconduct
  3. Deliberate circumvention of the computer security systems
  4. Intellectual property theft, including software piracy

Answer(s): B



Identify the attack from following sequence of actions?
Step 1: A user logs in to a trusted site and creates a new session
Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser
Step 3: The user is tricked to visit a malicious site
Step 4: the malicious site sends a request from the user's browser using his session cookie

  1. Web Application Denial-of-Service (DoS) Attack
  2. Cross-Site Scripting (XSS) Attacks
  3. Cross-Site Request Forgery (CSRF) Attack
  4. Hidden Field Manipulation Attack

Answer(s): C



Page 32 of 122



Post your Comments and Discuss EC-Council 312-49V9 exam with other Community members:

Olu commented on October 16, 2023
Question 235: 22,164 x 80 x 63 x 512 = 57.19 GB
UNITED STATES
upvote