[Free] 2019(Nov) EnsurePass ECCouncil 312-49v8 Dumps with VCE and PDF 101-110

Get Full Version of the Exam

Question No.101

File deletion is a way of removing a file from a computer#39;s file system. What happens when a file is deleted in windows7?

  1. The last letter of a file name is replaced by a hex byte code E5h

  2. The operating system marks the file#39;s name in the MFT with a special character that indicates that the file has been deleted

  3. Corresponding clusters in FAT are marked as used

  4. The computer looks at the clusters occupied by that file and does not avails space to store a new


Correct Answer: B

Question No.102

The evolution of web services and their increasing use in business offers new attack vectors in an application framework. Web services are based on XML protocols such as web Services Definition Language (WSDL) for describing the connection points, Universal Description, Discovery, and Integration (UDDI) for the description and discovery of Web services and Simple Object Access Protocol (SOAP) for communication between Web services that are vulnerable to various web application threats. Which of the following layer in web services stack is vulnerable to fault code leaks?

  1. Presentation Layer

  2. Security Layer

  3. Discovery Layer

  4. Access Layer

Correct Answer: C

Question No.103

Email archiving is a systematic approach to save and protect the data contained in emails so that it can tie easily accessed at a later date.

  1. True

  2. False

Correct Answer: A

Question No.104

Data acquisition system is a combination of tools or processes used to gather, analyze and record Information about some phenomenon. Different data acquisition system are used depends on the location, speed, cost. etc. Serial communication data acquisition system is used when the actual location of the data is at some distance from the computer. Which of the following communication standard is used in serial communication data acquisition system?

  1. RS422

  2. RS423

  3. RS232

  4. RS231

Correct Answer: C

Question No.105

Which of the following is not a part of the technical specification of the laboratory-based imaging system?

  1. High performance workstation PC

  2. Remote preview and imaging pod

  3. Anti-repudiation techniques

  4. very low image capture rate

Correct Answer: D

Question No.106

Under no circumstances should anyone, with the exception of qualified computer forensics personnel, make any attempts to restore or recover information from a computer system or device that holds electronic information.

  1. True

  2. False

Correct Answer: A

Question No.107

The need for computer forensics is highlighted by an exponential increase in the number of cybercrimes and litigations where large organizations were involved. Computer forensics plays an important role in tracking the cyber criminals. The main role of computer forensics is to:

  1. Maximize the investigative potential by maximizing the costs

  2. Harden organization perimeter security

  3. Document monitoring processes of employees of the organization

  4. Extract, process, and interpret the factual evidence so that it proves the attacker#39;s actions in the court

Correct Answer: D

Question No.108

A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?

  1. Plaintext

  2. Single pipe character

  3. Multiple pipe characters

  4. HTML tags

Correct Answer: A

Question No.109

Identify the attack from following sequence of actions?

Step 1: A user logs in to a trusted site and creates a new session

Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser Step 3: The user is tricked to visit a malicious site

Step 4: the malicious site sends a request from the user#39;s browser using his session cookie

  1. Web Application Denial-of-Service (DoS) Attack

  2. Cross-Site Scripting (XSS) Attacks

  3. Cross-Site Request Forgery (CSRF) Attack

  4. Hidden Field Manipulation Attack

Correct Answer: C

Question No.110

What is a chain of custody?

  1. A legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory

  2. It is a search warrant that is required for seizing evidence at a crime scene

  3. It Is a document that lists chain of windows process events

  4. Chain of custody refers to obtaining preemptive court order to restrict further damage of evidence in electronic seizures

Correct Answer: A

Get Full Version of the Exam
312-49v8 Dumps
312-49v8 VCE and PDF