[Aug 06, 2021] 312-49 PDF Dumps is essential on your 312-49 Exam Questions Certain Success! [Q26-Q41]

Share

[Aug 06, 2021]  312-49 PDF Dumps is essential on your 312-49 Exam Questions Certain Success!

312-49 PDF Questions - Perfect Prospect To Go With 312-49 Practice Exam

NEW QUESTION 26
You are running through a series of tests on your network to check for any security vulnerabilities.
After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall.
What has happened?

  • A. The firewall ACL has been purged
  • B. The firewall failed-closed
  • C. The firewall failed-bypass
  • D. The firewall failed-open

Answer: D

 

NEW QUESTION 27
Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?

  • A. Steganography
  • B. Picture encoding
  • C. Typography
  • D. Steganalysis

Answer: A

 

NEW QUESTION 28
Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security.
Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

  • A. Simple Network Management Protocol
  • B. Cisco Discovery Protocol
  • C. Border Gateway Protocol
  • D. Broadcast System Protocol

Answer: B

 

NEW QUESTION 29
In the following email header, where did the email first originate from?

  • A. Simon1.state.ok.gov.us
  • B. Smtp1.somedomain.com
  • C. Somedomain.com
  • D. David1.state.ok.gov.us

Answer: A

 

NEW QUESTION 30
What will the following command accomplish?

  • A. Test the ability of a router to handle under-sized packets
  • B. Test the ability of a router to handle fragmented packets
  • C. Test ability of a router to handle over-sized packets
  • D. Test the ability of a WLAN to handle fragmented packets

Answer: C

 

NEW QUESTION 31
The following is a log file screenshot from a default installation of IIS 6.0.

What time standard is used by IIS as seen in the screenshot?

  • A. TAI
  • B. GMT
  • C. UT
  • D. UTC

Answer: D

 

NEW QUESTION 32
Where is the default location for Apache access logs on a Linux computer?

  • A. bin/local/home/apache/logs/access_log
  • B. logs/usr/apache/access_log
  • C. usr/logs/access_log
  • D. usr/local/apache/logs/access_log

Answer: D

 

NEW QUESTION 33
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

  • A. A switched network will not respond to packets sent to the broadcast address
  • B. Only Windows systems will reply to this scan
  • C. Only Unix and Unix-like systems will reply to this scan
  • D. Only IBM AS/400 will reply to this scan

Answer: C

 

NEW QUESTION 34
When is it appropriate to use computer forensics?

  • A. If copyright and intellectual property theft/misuse has occurred
  • B. If a financial institution is burglarized by robbers
  • C. If employees do not care for their boss management techniques
  • D. If sales drop off for no apparent reason for an extended period of time

Answer: A

 

NEW QUESTION 35
When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?

  • A. Two
  • B. Four
  • C. Three
  • D. One

Answer: A

 

NEW QUESTION 36
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?

  • A. 0
  • B. 1
  • C. 2
  • D. 3

Answer: D

 

NEW QUESTION 37
In the following directory listing,

Which file should be used to restore archived email messages for someone using Microsoft Outlook?

  • A. Outlook bak
  • B. Outlook pst
  • C. Outlook NK2
  • D. Outlook ost

Answer: B

 

NEW QUESTION 38
What happens when a file is deleted by a Microsoft operating system using the FAT file system?

  • A. A copy of the file is stored and the original file is erased
  • B. The file is erased but can be recovered partially
  • C. Only the reference to the file is removed from the FAT and can be recovered
  • D. The file is erased and cannot be recovered

Answer: C

 

NEW QUESTION 39
A computer forensics investigator is inspecting the firewall logs for a large financial institution that has employees working 24 hours a day, 7 days a week.

What can the investigator infer from the screenshot seen below?

  • A. Buffer overflow attempt on the firewall.
  • B. A denial of service has been attempted
  • C. Network intrusion has occurred
  • D. A smurf attack has been attempted

Answer: C

 

NEW QUESTION 40
You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers:
http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

  • A. URL Obfuscation Arbitrary Administrative Access Vulnerability
  • B. HTTP Configuration Arbitrary Administrative Access Vulnerability
  • C. Cisco IOS Arbitrary Administrative Access Online Vulnerability
  • D. HTML Configuration Arbitrary Administrative Access Vulnerability

Answer: B

Explanation:
Explanation/Reference:

 

NEW QUESTION 41
......

312-49 Exam with Accurate Computer Hacking Forensic Investigator PDF Questions: https://www.actual4exams.com/312-49-valid-dump.html