[Free] 2018(Jan) EnsurePass Pass4sure ECCouncil EC1-349 Dumps with VCE and PDF 91-100

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released EC1-349
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/EC1-349.html

ECCouncil Computer Hacking Forensic Investigator

Question No: 91 – (Topic 2)

How many sectors will a 125 KB file use in a FAT32 file system?

  1. 32

  2. 16

C. 250

D. 25

Answer: C Explanation:

If you assume that we are using 512 bytes sectors, then 125×1024/512 = 250 sectors would be needed.

Actually, this is the same for a FAT16 file system as well.

Question No: 92 – (Topic 2)

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use in Ethereal?

  1. src port 23 and dst port 23

  2. src port 22 and dst port 22

  3. udp port 22 and host 172.16.28.1/24

  4. net port 22

Answer: B

Question No: 93 – (Topic 2)

In General, Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

  1. Network Forensics

  2. Data Recovery

  3. Disaster Recovery

  4. Computer Forensics

Answer: D

Question No: 94 – (Topic 2)

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printed out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the in order to track the emails back to the suspect.

  1. Routing Table

  2. Firewall log

  3. Configuration files

  4. Email Header

Answer: D

Question No: 95 – (Topic 2)

You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firm’s employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?

  1. Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned

  2. Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment

  3. Inform the owner that conducting an investigation without a policy is a violation of the employees’ expectation of privacy

  4. Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies

Answer: C

Question No: 96 – (Topic 2)

You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and passwords. What tool could you use to get this information?

  1. Snort

  2. Airsnort

  3. Ettercap

  4. RaidSniff

Answer: C

Question No: 97 – (Topic 2)

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive footprinting against their Web servers. What tool should you use?

  1. Dig

  2. Ping sweep

  3. Netcraft

  4. Nmap

Answer: C

Question No: 98 – (Topic 2)

Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

  1. Simple Network Management Protocol

  2. Cisco Discovery Protocol

  3. Border Gateway Protocol

  4. Broadcast System Protocol

Answer: B

Question No: 99 – (Topic 2)

You should make at least how many bit-stream copies of a suspect drive?

  1. 1

  2. 2

  3. 3

  4. 4

Answer: B

Question No: 100 – (Topic 2)

Software firewalls work at which layer of the OSI model?

  1. Transport

  2. Application

  3. Data Link

  4. Network

Answer: C

100% Ensurepass Free Download!
Download Free Demo:EC1-349 Demo PDF
100% Ensurepass Free Guaranteed!
EC1-349 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No