Free 312-49V9 Exam Braindumps (page: 40)

Page 39 of 122

SIM is a removable component that contains essential information about the subscriber. It has both volatile and non-volatile memory. The file system of a SIM resides in _____________ memory.

  1. Volatile
  2. Non-volatile

Answer(s): B



Smith, as a part his forensic investigation assignment, has seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith found that the SIM was protected by a Personal identification Number (PIN) code but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He unsuccessfully tried three PIN numbers that blocked the SIM card. What Jason can do in this scenario to reset the PIN and access SIM data?

  1. He should contact the device manufacturer for a Temporary Unlock Code (TUK) to gain access to the SIM
  2. He cannot access the SIM data in this scenario as the network operators or device manufacturers have no idea about a device PIN
  3. He should again attempt PIN guesses after a time of 24 hours
  4. He should ask the network operator for Personal Unlock Number (PUK) to gain access to the SIM

Answer(s): D



Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.

  1. True
  2. False

Answer(s): A



Attacker uses vulnerabilities in the authentication or session management functions such as exposed accounts, session IDs, logout, password management, timeouts, remember me. secret question, account update etc. to impersonate users, if a user simply closes the browser without logging out from sites accessed through a public computer, attacker can use the same browser later and exploit the user's privileges. Which of the following vulnerability/exploitation is referred above?

  1. Session ID in URLs
  2. Timeout Exploitation
  3. I/O exploitation
  4. Password Exploitation

Answer(s): B






Post your Comments and Discuss EC-Council 312-49V9 exam with other Community members:

312-49V9 Discussions & Posts