Get Full Version of the Exam
http://www.EnsurePass.com/312-49v8.html
Question No.21
Physical security recommendations: There should be only one entrance to a forensics lab.
-
True
-
False
Correct Answer: A
Question No.22
Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses to transfer log messages in a clear text format.
-
TCP
-
FTP
-
SMTP
-
POP
Correct Answer: A
Question No.23
Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server#39;s root directory?
-
Unvalidated input
-
Parameter/form tampering
-
Directory traversal
-
Security misconfiguration
Correct Answer: C
Question No.24
Raw data acquisition format creates of a data set or suspect drive.
-
Simple sequential flat files
-
Segmented files
-
Compressed image files
-
Segmented image files
Correct Answer: A
Question No.25
When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on.
-
True
-
False
Correct Answer: B
Question No.26
Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications. Which data compression technique maintains data integrity?
-
Lossless compression
-
Lossy compression
-
Speech encoding compression
-
Lossy video compression
Correct Answer: A
Question No.27
Which of the following commands shows you the names of all open shared files on a server and
number of file locks on each file?
-
Net sessions
-
Net file
-
Netconfig
-
Net share
Correct Answer: B
Question No.28
Who is responsible for the following tasks?
Secure the scene and ensure that it is maintained In a secure state until the Forensic Team advises
Make notes about the scene that will eventually be handed over to the Forensic Team
-
Non-Laboratory Staff
-
System administrators
-
Local managers or other non-forensic staff
-
Lawyers
Correct Answer: A
Question No.29
Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc. Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?
-
IP address spoofing
-
Man-in-the-middle attack
-
Denial of Service attack
-
Session sniffing
Correct Answer: A
Question No.30
A mobile operating system is the operating system that operates a mobile device like a mobile phone, smartphone, PDA, etc. It determines the functions and features available on mobile devices such as keyboards, applications, email, text messaging, etc. Which of the following mobile operating systems is free and open source?
-
Web OS
-
Android
-
Apple IOS
-
Symbian OS
Correct Answer: B
Get Full Version of the Exam
312-49v8 Dumps
312-49v8 VCE and PDF