EC-Council certification is valued there work. Holder with EC-Council certification can put with regard to position everywhere in the world. EC-Council certification is definitely the identity with assurance. An expert might strengthen his/her functions and can easily make improvements to his/her knowledge in addition to competence together with EC-Council. Firms are seeking people personnel whore good accredited and have additional normal capabilities in addition to competencies on their field.
2021 Nov EC0-349 brain dumps
Q81. Which part of the Windows Registry contains the user's password file?
A. HKEY_LOCAL_MACHINE
B. HKEY_CURRENT_USER
C. HKEY_CURRENT_CONFIGURATION
D. HKEY_USER
Answer: D
Q82. A state department site was recently attacked and all the servers had their hard disks erased. The incident response team sealed the area and commenced investigation. During evidence collection, they came across a zip disk that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?
A. They attempted to implicate personnel without proof
B. They called in the FBI without correlating with the fingerprint data
C. They examined the actual evidence on an unrelated system
D. They tampered with the evidence by using it
Answer: D
Q83. What information do you need to recover when searching a victims computer for a crime committed with specific e-mail message?
A. E-mail header
B. Firewall log
C. Internet service provider information
D. Username and password
Answer: A
Q84. Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?
A. Trick the switch into thinking it already has a session with Terri's computer
B. Poison the switch's MAC address table by flooding it with ACK bits
C. Crash the switch with aDoS attack since switches cannot send ACK bits
D. Enable tunneling feature on the switch
Answer: A
Q85. Before you are called to testify as an expert, what must an attorney do first?
A. read your curriculum vitae to the jury
B. engage in damage control
C. qualify you as an expert witness
D. prove that the tools you used to conduct your examination are perfect
Answer: C
Renewal EC0-349 study guide:
Q86. You are working as computer forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firms employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?
A. inform the owner that conducting an investigation without a policy is a violation of the 4th Amendment
B. inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies
C. inform the owner that conducting an investigation without a policy is a violation of the employees expectation of privacy
D. inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned
Answer: C
Q87. Microsoft Outlook maintains email messages in a proprietary format in what type of file?
A. .email
B. .doc
C. .pst
D. .mail
Answer: C
38. You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?
A. Trade secrets
B. the attorney-work-product rule
C. ISO 17799
D. Good manners
Answer: B
Q88. You are working in the Security Department of a law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is a possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the companys SMTP server?
A. 25
B. 10
C. 135
D. 110
Answer: A
Q89. so that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.
A. scope creep
B. hard drive failure
C. unauthorized expenses
D. overzealous marketing
Answer: A
Q90. A(n) is one thats performed by a computer program rather than the attacker manually performing the steps in the attack sequence.
A. central processing attack
B. blackout attack
C. automated attack
D. distributed attack
Answer: C