PrepAway - Latest Free Exam Questions & Answers

Category: 312-49

Exam 312-49: Computer Hacking Forensic Investigator

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link c

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

What can the investigator do to prove the violation?

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation? Choose the most feasible option.

What is one that’s performed by a computer program rather than the attacker manually performing the step

A(n) _____________________ is one that’s performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the rout

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

When examining a file with a Hex Editor, what space does the file header occupy?

When examining a file with a Hex Editor, what space does the file header occupy?


Page 20 of 21« First...10...1718192021