[Free] 2019(Nov) EnsurePass ECCouncil 312-49v8 Dumps with VCE and PDF 61-70

Get Full Version of the Exam

Question No.61

Email spoofing refers to:

  1. The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source

  2. The criminal act of sending an illegitimate email, falsely claiming to be from a legitimate site in an attempt to acquire the user#39;s personal or account information

  3. Sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address Is hosted to cause a denial-of-service attack

  4. A sudden spike of quot;Reply Allquot; messages on an email distribution list, caused by one misdirected message

Correct Answer: A

Question No.62

Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data.

  1. True

  2. False

Correct Answer: A

Question No.63

Computer forensics report provides detailed information on complete computer forensics investigation process. It should explain how the incident occurred, provide technical details of the incident and should be clear to understand. Which of the following attributes of a forensics report can render it inadmissible in a court of law?

  1. It includes metadata about the incident

  2. It includes relevant extracts referred to In the report that support analysis or conclusions

  3. It is based on logical assumptions about the incident timeline

  4. It maintains a single document style throughout the text

Correct Answer: C

Question No.64

Smith, as a part his forensic investigation assignment, has seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith found that the SIM was protected by a Personal identification Number (PIN) code but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He unsuccessfully tried three PIN numbers that blocked the SIM card. What Jason can do in this scenario to reset the PIN and access SIM data?

  1. He should contact the device manufacturer for a Temporary Unlock Code (TUK) to gain access to the SIM

  2. He cannot access the SIM data in this scenario as the network operators or device manufacturers have no idea about a device PIN

  3. He should again attempt PIN guesses after a time of 24 hours

  4. He should ask the network operator for Personal Unlock Number (PUK) to gain access to the SIM

    Correct Answer: D

    Question No.65

    Which of the following approaches checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

    1. Graph-based approach

    2. Neural network-based approach

    3. Rule-based approach

    4. Automated field correlation approach

Correct Answer: D

Question No.66

The Recycle Bin is located on the Windows desktop. When you delete an item from the hard disk, Windows sends that deleted item to the Recycle Bin and the icon changes to full from empty, but items deleted from removable media, such as a floppy disk or network drive, are not stored in the Recycle Bin. What is the size limit for Recycle Bin in Vista and later versions of the Windows?

  1. No size limit

  2. Maximum of 3.99 GB

  3. Maximum of 4.99 GB

  4. Maximum of 5.99 GB

Correct Answer: A

Question No.67

The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS format includes basic items, such as client IP address, user name, date and time, service and instance, server name and IP address, request type, target of operation, etc. Identify the service status code from the following IIS log., -, 03/6/11, 8:45:30, W3SVC2, SERVER,, 4210, 125, 3524, 100, 0,

GET, /dollerlogo.gif,









Correct Answer: D

Question No.68

Which Is a Linux journaling file system?

  1. Ext3

  2. HFS

  3. FAT

  4. BFS

Correct Answer: A

Question No.69

Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader?

  1. Open code steganography

  2. Visual semagrams steganography

  3. Text semagrams steganography

  4. Technical steganography

Correct Answer: A

Question No.70

What is the first step that needs to be carried out to investigate wireless attacks?

  1. Obtain a search warrant

  2. Identify wireless devices at crime scene

  3. Document the scene and maintain a chain of custody

  4. Detect the wireless connections

Correct Answer: A

Get Full Version of the Exam
312-49v8 Dumps
312-49v8 VCE and PDF

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com