PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 412-79 (update September 4th, 2014)

Exam 412-79: EC-Council Certified Security Analyst (ECSA) (update September 4th, 2014)

What do you think would be the next sequence of events?

Chris has been called upon to investigate a hacking incident reported by one of his clients. The
company suspects the involvement of an insider accomplice in the attack. Upon reaching the
incident scene, Chris secures the physical area, records the scene using visual mediA. He shuts
the system down by pulling the power plug so that he does not disturb the system in any way. He
labels all cables and connectors prior to disconnecting any. What do you think would be the next
sequence of events?

Where did the incident team go wrong?

A state department site was recently attacked and all the servers had their disks eraseD. The
incident response team sealed the area and commenced investigation. During evidence collection

they came across a zip disks that did not have the standard labeling on it. The incident team ran
the disk on an isolated system and found that the system disk was accidentally eraseD. They
decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects
including three summer interns. Where did the incident team go wrong?

What port do you send the email to on the company SMTP server?

You are working in the security Department of law firm. One of the attorneys asks you about the
topic of sending fake email because he has a client who has been charged with doing just that. His
client alleges that he is innocent and that there is no way for a fake email to actually be sent. You
inform the attorney that his client is mistaken and that fake email is possibility and that you can
prove it. You return to your desk and craft a fake email to the attorney that appears to come from
his boss. What port do you send the email to on the company SMTP server?

which of the following options would you suggest as the most appropriate to overcome the problem of capturing

Volatile Memory is one of the leading problems for forensics. Worms such as code Red are
memory resident and do write themselves to the hard drive, if you turn the system off they
disappear. In a lab environment, which of the following options would you suggest as the most
appropriate to overcome the problem of capturing volatile memory?


Page 22 of 22« First...10...1819202122