[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil EC1-349 Dumps with VCE and PDF 71-80
Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC1-349
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC1-349.html
ECCouncil Computer Hacking Forensic Investigator
Question No: 71 – (Topic 1)
Davidson Trucking is a small transportation company that has three local offices in Detroit Michigan. Ten female employees that work for the company have gone to an attorney reporting that male employees repeatedly harassed them and that management did nothing to stop the problem. Davidson has employee policies that outline all company guidelines, including awareness on harassment and how it will not be tolerated. When the case is brought to court, whom should the prosecuting attorney call upon for not upholding company policy?
-
IT personnel
-
Employees themselves
-
Supervisors
-
Administrative assistant in charge of writing policies
Answer: C
Question No: 72 – (Topic 1)
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?
-
On the individual computer ARP cacheOn the individual computer? ARP cache
-
In the Web Server log files
-
In the DHCP Server log files
-
There is no way to determine the specific IP address
Answer: C
Question No: 73 – (Topic 1)
When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
-
Write-blocker
-
Protocol analyzer
-
Firewall
-
Disk editor
Answer: A
Question No: 74 – (Topic 1)
John is working on his company policies and guidelines. The section he is currently working on covers company documents; how they shouldJohn is working on his company? policies and guidelines. The section he is currently working on covers company documents; how they should be handled, stored, and eventually destroyed. John is concerned about the process whereby outdated documents are destroyed. What type of shredder should John write in the guidelines to be used when destroying documents?
-
Strip-cut shredder
-
Cross-cut shredder
-
Cross-hatch shredder
-
Cris-cross shredder
Answer: B
Question No: 75 – (Topic 1)
An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation, the CEO informs them that the incident will be classified as ow level? How long will the team have to respond to the incident?the investigation, the CEO informs them that the incident will be classified as ?ow level? How long will the team have to respond to the incident?
-
One working day
-
Two working days
-
Immediately
-
Four hours
Answer: A
Topic 2, Volume B
Question No: 76 – (Topic 2)
While working for a prosecutor, What do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense ?
-
Keep the information of file for later review
-
Destroy the evidence
-
Bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge
-
Present the evidence to the defense attorney
Answer: C
Question No: 77 – (Topic 2)
If you see the files Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?
-
The system has been compromised using a t0rnrootkit
-
The system administrator has created an incremental backup
-
The system files have been copied by a remote attacker
-
Nothing in particular as these can be operational files
Answer: D
Question No: 78 – (Topic 2)
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software ?
-
Computer Forensics Tools and Validation Committee (CFTVC)
-
Association of Computer Forensics Software Manufactures (ACFSM)
-
National Institute of Standards and Technology (NIST)
-
Society for Valid Forensics Tools and Testing (SVFTT)
Answer: C
Question No: 79 – (Topic 2)
Click on the Exhibit Button Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette#39;s duties include logging on to all the company#39;s network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible. Paulette presents the following screenshot to her boss so he can inform the client about necessary changes need to be made. From the screenshot, what changes should the client company make?
-
The banner should include the Cisco tech support contact information as well
-
The banner should have more detail on the version numbers for the networkeQuipment
-
The banner should not state quot;only authorized IT personnel may proceedquot;
-
Remove any identifying numbers, names, or version information
Answer: D
Question No: 80 – (Topic 2)
You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:
http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?
-
URL Obfuscation Arbitrary Administrative Access Vulnerability
-
HTML Configuration Arbitrary Administrative Access Vulnerability
-
Cisco IOS Arbitrary Administrative Access Online Vulnerability
-
HTTP Configuration Arbitrary Administrative Access Vulnerability
Answer: D
100% Ensurepass Free Download!
–Download Free Demo:EC1-349 Demo PDF
100% Ensurepass Free Guaranteed!
–EC1-349 Dumps
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF