PrepAway - Latest Free Exam Questions & Answers

Category: 312-49

Exam 312-49: Computer Hacking Forensic Investigator

You are a computer forensics investigator working with local police department …

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or othe

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

What is the result of this test?

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says:
“This is a test.” What is the result of this test?

If an attacker’s computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning,

If an attacker’s computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?


Page 6 of 21« First...45678...20...Last »