[Free] 2019(Nov) EnsurePass ECCouncil 312-49v8 Dumps with VCE and PDF 51-60

Get Full Version of the Exam

Question No.51

Attackers can manipulate variables that reference files with quot;dot-dot-slash (./)quot; sequences and their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.

Identify the attack referred.

  1. Directory traversal

  2. SQL Injection

  3. XSS attack

  4. File injection

Correct Answer: A

Question No.52

What is a SCSI (Small Computer System Interface)?

  1. A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners.

  2. A standard electronic interface used between a computer motherboard#39;s data paths or bus and the computer#39;s disk storage devices.

  3. A quot;plug-and-playquot; interface, which allows a device to be added without an adapter card and without rebooting the computer.

  4. A point-to-point serial bi-directional interface for transmitting data between computer devices at data rates of up to 4 Gbps.

Correct Answer: A

Question No.53

Which of the following statements is incorrect related to acquiring electronic evidence at crime scene?

  1. Sample banners are used to record the system activities when used by the unauthorized user.

  2. In warning banners, organizations give clear and unequivocal notice to intruders that by signing onto the system they are expressly consenting to such monitoring.

  3. The equipment is seized which is connected to the case, knowing the role of the computer which will indicate what should be taken.

  4. At the time of seizing process, you need to shut down the computer immediately.

Correct Answer: D

Question No.54

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures, such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure the employees of the organization to connect to it?

  1. War driving

  2. Rogue access points

  3. MAC spoofing

  4. Client mis-association

Correct Answer: D

Question No.55

Which of the following is not a part of disk imaging tool requirements?

  1. The tool should not change the original content

  2. The tool should log I/O errors in an accessible and readable form, including the type and location of the error

  3. The tool must have the ability to be held up to scientific and peer review

  4. The tool should not compute a hash value for the complete bit stream copy generated from an image file of the source

Correct Answer: D

Question No.56

The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin?

  1. INFO2 file

  2. INFO1 file

  3. LOGINFO2 file

  4. LOGINFO1 file

Correct Answer: A

Question No.57

An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes). Which property of the image shows you the number of colors available for each pixel in an image?

  1. Pixel

  2. Bit Depth

  3. File Formats

  4. Image File Size

Correct Answer: B

Question No.58

TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to connect different hosts in the Internet. It contains four layers, namely the network interface layer. Internet layer, transport layer, and application layer. Which of the following protocols works under the transport layer of TCP/IP?

  1. UDP

  2. HTTP

  3. FTP

  4. SNMP

Correct Answer: A

Question No.59

System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to function.

  1. True

  2. False

Correct Answer: A

Question No.60

The ARP table of a router comes in handy for Investigating network attacks, as the table contains IP addresses associated with the respective MAC addresses.

The ARP table can be accessed using the command in Windows 7.


  1. Option A

  2. Option B

  3. Option C

  4. Option D

Correct Answer: A

Get Full Version of the Exam
312-49v8 Dumps
312-49v8 VCE and PDF