一、Examsoon分享312-49認證考古題
Examsoon的312-49認證考古題由資深IT認證講師和312-49産品專家結合PROMETRIC或VUE的真實考試環境最新原題傾心打造.
Examsoon認證考試題庫-始終致力與爲客戶提供EC-COUNCIL認證的全真考題及認證學習資料,助您壹次通過EC-COUNCIL認證考試。下面是EC-COUNCIL認證考試312-49考古題分享:
312-49考古題問題與答案賞析:
1. The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be?
A. Any data not yet flushed to the system will be lost
B. All running processes will be lost
C. The /tmp directory will be flushed
D. Power interruption will corrupt the pagefile
Answer: AB
2. Microsoft Outlook maintains email messages in a proprietary format in what type of file?
A. .email
B. .mail
C. .pst
D. .doc
Answer: C
3. In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?
A. The ISP can investigate anyone using their service and can provide you with assistance
B. The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
C. The ISP can't conduct any type of investigations on anyone and therefore can't assist you
D. ISP's never maintain log files so they would be of no use to your investigation
Answer: B
4. You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?
A. ARP Poisoning
B. DNS Poisoning
C. HTTP redirect attack
D. IP Spoofing
Answer: B
5. You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You
inform him that a simple backup copy will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?
A. Bit-stream Copy
B. Robust Copy
C. Full backup Copy
D. Incremental Backup Copy
Answer: A
二、312-49認證證照基本資料:
Computer Hacking Forensic Investigator
科目編號 : 312-49
科目名稱 : Computer Hacking Forensic Investigator
三、EC-COUNCIL認證312-49 考試推薦:
312-49 考試是EC-COUNCIL認證的 Computer Hacking Forensic Investigator 認證考試官方代號,Computer Hacking Forensic Investigator 認證作為全球IT領域專家 EC-COUNCIL 熱門認證之一,是許多大中IT企業選擇人才標準的必備條件。
Certified Ethical Hacker認證是業界最廣泛認可的IT技術認證之一,也是業界最權威、最受尊敬的認證之一。獲得312-49認證不僅僅能證明您的IT技術能力,更是您進入職場的敲門磚,也是提高您身價的另一捷徑。
EC-Council一個跨國際的資訊安全教育機構,專門為此網路問題抽絲剝繭,於認證中探討目前網路危機及網路安全預防,並且輔導取得國際性認證為公司及個人提升競爭力加強顧戶服務品質。
更多IT認證考試科目推薦:
留言列表