PrepAway - Latest Free Exam Questions & Answers

Category: 312-49 (v.4)

Briefing 312-49: ECCouncil Computer Hacking Forensic Investigator (update December 06th, 2017)

What is this information posted on the job website cons…

You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test
for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+
years experience in Windows Server environment 5+ years experience in Exchange 2000/2003 environment
Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are
required MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed What is this information
posted on the job website considered?

What is Terri trying to accomplish by sending this IP p…

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in
Tokyo. Terri’s duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP
packet to one of the company’s switches with ACK bit and the source address of her machine set. What is
Terri trying to accomplish by sending this IP packet?

Why will this not be viable?

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his
production network. In this honeypot, he has placed a server running Windows Active Directory. He has also
placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download
sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder
accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the
intruder for stealing sensitive corporate information. Why will this not be viable?


Page 14 of 32« First...1213141516...2030...Last »