PrepAway - Latest Free Exam Questions & Answers

Tag: Exam ECSS

Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking
on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based
network. Jason successfully enters the target system remotely by using the advantage of
vulnerability. He places a Trojan to maintain future access and then disconnects the remote
session.
The employees of the company complain to Mark, who works as a Professional Ethical Hacker for
DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that
some irrelevant log files and signs of Trojans are present on the computers. He suspects that a
malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and
catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators
catch him?

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the
security of www.we-are-secure.com. The company has provided the following information about
the infrastructure of its network:
·Network diagrams of the we-are-secure infrastructure
·Source code of the security tools
· IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its
network?

Which of the following statements are true about AWStats?

Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from
various resources such as Apache log files, IIS logs, streaming servers, and some FTP servers.
He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam
decides to use AWStats application. Which of the following statements are true about AWStats?
Each correct answer represents a complete solution. Choose all that apply.

Which of the following type of witnesses is a lay witness?

Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He
is working on a case of a cyber crime. Peter knows that the good investigative report should not
only communicate the relevant facts, but also present expert opinion. This report should not
include the cases in which the expert acted as a lay witness. Which of the following type of
witnesses is a lay witness?


Page 9 of 28« First...7891011...20...Last »