Which Is a Linux journaling file system?
A. Ext3
B. HFS
C. FAT
D. BFS
Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader?
A. Open code steganography
B. Visual semagrams steganography
C. Text semagrams steganography
D. Technical steganography
The status of the network interface cards (NICs) connected to a system gives information about whether the system is connected to a wireless access point and what IP address is being used. Which command displays the network configuration of the NICs on the system?
A. ipconfig /all
B. netstat
C. net session
D. tasklist
What is a SCSI (Small Computer System Interface)?
A. A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners
B. A standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices
C. A "plug-and-play" interface, which allows a device to be added without an adapter card and without rebooting the computer
D. A point-to-point serial bi-directional interface for transmitting data between computer devices at data rates of up to 4 Gbps
You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at which sessions the machine has opened with other systems?
A. Net sessions
B. Net use
C. Net config
D. Net share
You can interact with the Registry through intermediate programs. Graphical user interface (GUI) Registry editors such as Regedit.exe or Regedt32 exe are commonly used as intermediate programs in Windows 7. Which of the following is a root folder of the registry editor?
A. HKEY_USERS
B. HKEY_LOCAL_ADMIN
C. HKEY_CLASSES_ADMIN
D. HKEY_CLASSES_SYSTEM
MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network
A. 16-bit address
B. 24-bit address
C. 32-bit address
D. 48-bit address
The ARP table of a router comes in handy for Investigating network attacks, as the table contains IP addresses associated with the respective MAC addresses.
The ARP table can be accessed using the __________command in Windows 7.
A. C:\arp -a
B. C:\arp -d
C. C:\arp -s
D. C:\arp -b
Consistency in the investigative report is more important than the exact format in the report to eliminate uncertainty and confusion.
A. True
B. False
When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on
A. True
B. False
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.