[Free] 2019(Nov) EnsurePass ECCouncil 312-49v8 Dumps with VCE and PDF 11-20

Get Full Version of the Exam

Question No.11

P0P3 (Post Office Protocol 3) is a standard protocol for receiving email that deletes mail on the server as soon as the user downloads it. When a message arrives, the POP3 server appends it to the bottom of the recipient#39;s account file, which can be retrieved by the email client at any preferred time. Email client connects to the POP3 server at by default to fetch emails.

  1. Port 109

  2. Port 110

  3. Port 115

  4. Port 123

Correct Answer: B

Question No.12

Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:

  1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion \ProfileList

  2. HKEY_LOCAL_MACHlNE\SOFTWARE\Microsoft\Windows NT\CurrentVersion \NetworkList

  3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentsVersion \setup

  4. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule

Correct Answer: A

Question No.13

BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?

  1. Header

  2. The RGBQUAD array

  3. Information header

  4. Image data

Correct Answer: B

Question No.14

How do you define forensic computing?

  1. It is the science of capturing, processing, and investigating data security incidents and making it acceptable to a court of law.

  2. It is a methodology of guidelines that deals with the process of cyber investigation

  3. It Is a preliminary and mandatory course necessary to pursue and understand fundamental principles of ethical hacking

  4. It is the administrative and legal proceeding in the process of forensic investigation

Correct Answer: A

Question No.15

When collecting electronic evidence at the crime scene, the collection should proceed from the most volatile to the least volatile

  1. True

  2. False

Correct Answer: A

Question No.16

LBA (Logical Block Address) addresses data by allotting a to each sector of the hard disk.

  1. Sequential number

  2. Index number

  3. Operating system number

  4. Sector number

Correct Answer: A

Question No.17

Which device in a wireless local area network (WLAN) determines the next network point to which a packet should be forwarded toward its destination?

  1. Wireless router

  2. Wireless modem

  3. Antenna

  4. Mobile station

Correct Answer: A

Question No.18

The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux.

Identify the Apache error log from the following logs.

A. – frank [10/Oct/2000:13:55:36-0700] quot;GET /apache_pb.grf HTTP/1.0quot; 200 2326

B. [Wed Oct 11 14:32:52 2000] [error] [client] client denied by server configuration:


C. http://victim.com/scripts/…/…/…/…/…/…/..%a f./…/../winnt/system32/cmd.exe?/c dir c:\wintt\system32\Logfiles\W3SVC1

D. [10/Apr/2007:10:39:11 0300] ] [error] quot;GET /apache_pb.gif HTTP/1.0#39; 200 2326

Correct Answer: B

Question No.19

SIM is a removable component that contains essential information about the subscriber. It has both volatile and non-volatile memory. The file system of a SIM resides in memory.

  1. Volatile

  2. Non-volatile

Correct Answer: B

Question No.20

Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?

  1. Event logs

  2. Audit logs

  3. Firewall logs

  4. IDS logs

Correct Answer: A

Get Full Version of the Exam
312-49v8 Dumps
312-49v8 VCE and PDF