최신 Certified Ethical Hacker 312-49v11 무료샘플문제:
1. Computer security logs contain information about the events occurring within an organization's systems and networks. Application and Web server log files are useful in detecting web attacks.
The source, nature, and time of the attack can be determined by _________of the compromised system.
A) Analyzing SAM file
B) Analyzing log files
C) Analyzing hard disk boot records
D) Analyzing rainbow tables
2. Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
A) Linux/Unix computers are constantly talking
B) Windows computers are constantly talking
C) Linux/Unix computers are easier to compromise
D) Windows computers will not respond to idle scans
3. Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.
A) True
B) False
4. What happens when a file is deleted by a Microsoft operating system using the FAT file system?
A) The file is erased and cannot be recovered
B) The file is erased but can be recovered partially
C) A copy of the file is stored and the original file is erased
D) Only the reference to the file is removed from the FAT and can be recovered
5. Which of the following statements is incorrect when preserving digital evidence?
A) Remove the power cable depending on the power state of the computer i.e., in on. off, or in sleep mode
B) Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals
C) Turn on the computer and extract Windows event viewer log files
D) Verily if the monitor is in on, off, or in sleep mode
질문과 대답:
질문 # 1 정답: B | 질문 # 2 정답: B | 질문 # 3 정답: A | 질문 # 4 정답: D | 질문 # 5 정답: C |