Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?
A. Ad hoc associations
B. Client mis-association
C. MAC spoofing
D. Rogue access points
Who is responsible for the following tasks?
Secure the scene and ensure that is maintained in a secure state until the Forensic Team advises
Make notes about the scene that will eventually be handed over to the Forensic Team
A. Non-forensics staff
B. Lawyers
C. System administrators
D. Local managers or other non-forensic staff
Brian needs to acquire data from RAID storage. Which of the following acquisition methods is recommended to retrieve only the data relevant to the investigation?
A. Static Acquisition
B. Sparse or Logical Acquisition
C. Bit-stream disk-to-disk Acquisition
D. Bit-by-bit Acquisition
Which of the following stages in a Linux boot process involve initialization of the system's hardware?
A. BIOS Stage
B. Bootloader Stage
C. BootROM Stage
D. Kernel Stage
What is the capacity of Recycle bin in a system running on Windows Vista?
A. 2.99GB
B. 3.99GB
C. Unlimited
D. 10% of the partition space
Which of the following tool captures and allows you to interactively browse the traffic on a network?
A. Security Task Manager
B. Wireshark
C. ThumbsDisplay
D. RegScanner
Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?
A. Dictionary attack
B. Brute force attack
C. Rule-based attack
D. Man in the middle attack
Which US law does the interstate or international transportation and receiving of child pornography fall under?
A. §18. U.S.C. 1466A
B. §18. U.S.C 252
C. §18. U.S.C 146A
D. §18. U.S.C 2252
Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?
A. Data collection
B. Secure the evidence
C. First response
D. Data analysis
Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?
A. Shortcut Files
B. Virtual files
C. Prefetch Files
D. Image Files
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.