312-49v9 Dumps

312-49v9 Free Practice Test

EC-Council 312-49v9: ECCouncil Computer Hacking Forensic Investigator (V9)

QUESTION 51

- (Topic 3)
You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says:
"This is a test." What is the result of this test?

Correct Answer: B

QUESTION 52

- (Topic 3)
Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However law enforcement agencies were recording his every activity and this was later presented as evidence. The organization had used a virtual environment to trap Jones. What is a virtual environment?

Correct Answer: B

QUESTION 53

- (Topic 1)
Computer security logs contain information about the events occurring within an organization's systems and networks. Application and Web server log files are useful in detecting web attacks. The source, nature, and time of the attack can be determined by ____ of the compromised system.

Correct Answer: A

QUESTION 54

- (Topic 3)
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

Correct Answer: B

QUESTION 55

- (Topic 1)
What is the "Best Evidence Rule"?

Correct Answer: A