최신EC-COUNCIL Computer Hacking Forensic Investigator - 312-49v8무료샘플문제
문제1
If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?
If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?
정답: C
문제2
Determine the message length from following hex viewer record:

Determine the message length from following hex viewer record:

정답: A
문제3
A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?
A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?
정답: D
문제4
LBA (Logical Block Address) addresses data by allotting a ___________to each sector of the hard disk.
LBA (Logical Block Address) addresses data by allotting a ___________to each sector of the hard disk.
정답: B
문제5
Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:
Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:
정답: D
문제6
Computer forensics report provides detailed information on complete computer forensics investigation process. It should explain how the incident occurred, provide technical details of the incident and should be clear to understand. Which of the following attributes of a forensics report can render it inadmissible in a court of law?
Computer forensics report provides detailed information on complete computer forensics investigation process. It should explain how the incident occurred, provide technical details of the incident and should be clear to understand. Which of the following attributes of a forensics report can render it inadmissible in a court of law?
정답: D
문제7
In an echo data hiding technique, the secret message is embedded into a __________as an echo.
In an echo data hiding technique, the secret message is embedded into a __________as an echo.
정답: C
문제8
TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to connect different hosts in the Internet. It contains four layers, namely the network interface layer. Internet layer, transport layer, and application layer.
Which of the following protocols works under the transport layer of TCP/IP?
TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to connect different hosts in the Internet. It contains four layers, namely the network interface layer. Internet layer, transport layer, and application layer.
Which of the following protocols works under the transport layer of TCP/IP?
정답: B
문제9
Which of the following is not an example of a cyber-crime?
Which of the following is not an example of a cyber-crime?
정답: D
문제10
Injection flaws are web application vulnerabilities that allow untrusted data to be Interpreted and executed as part of a command or query. Attackers exploit injection flaws by constructing malicious commands or queries that result in data loss or corruption, lack of accountability, or denial of access. Which of the following injection flaws involves the injection of malicious code through a web application?
Injection flaws are web application vulnerabilities that allow untrusted data to be Interpreted and executed as part of a command or query. Attackers exploit injection flaws by constructing malicious commands or queries that result in data loss or corruption, lack of accountability, or denial of access. Which of the following injection flaws involves the injection of malicious code through a web application?
정답: C