Which of the following attacks allows attacker to acquire access to the communication channels between the victim and server to extract the information?
A. Man-in-the-middle (MITM) attack
B. Replay attack
C. Rainbow attack
D. Distributed network attack
Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11i
Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.
A. True
B. False
Data files from original evidence should be used for forensics analysis
A. True
B. False
What is a first sector ("sector zero") of a hard disk?
A. Master boot record
B. System boot record
C. Secondary boot record
D. Hard disk boot record
Attacker uses vulnerabilities in the authentication or session management functions such as exposed accounts, session IDs, logout, password management, timeouts, remember me. secret question, account update etc. to impersonate users, if a user simply closes the browser without logging out from sites accessed through a public computer, attacker can use the same browser later and exploit the user's privileges. Which of the following vulnerability/exploitation is referred above?
A. Session ID in URLs
B. Timeout Exploitation
C. I/O exploitation
D. Password Exploitation
Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.
A. True
B. False
What is the smallest allocation unit of a hard disk?
A. Cluster
B. Spinning tracks
C. Disk platters
D. Slack space
Which of the following reports are delivered under oath to a board of directors/managers/panel of jury?
A. Written informal Report
B. Verbal Formal Report
C. Written Formal Report
D. Verbal Informal Report
Which of the following commands shows you all of the network services running on Windows-based servers?
A. Net start
B. Net use
C. Net Session
D. Net share
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.