312-49v9 Dumps

312-49v9 Free Practice Test

EC-Council 312-49v9: ECCouncil Computer Hacking Forensic Investigator (V9)

QUESTION 16

- (Topic 3)
You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?

Correct Answer: A

QUESTION 17

- (Topic 1)
Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?

Correct Answer: A

QUESTION 18

- (Topic 1)
The evolution of web services and their increasing use in business offers new attack vectors in an application framework. Web services are based on XML protocols such as web Services Definition Language (WSDL) for describing the connection points, Universal Description, Discovery, and Integration (UDDI) for the description and discovery of Web services and Simple Object Access Protocol (SOAP) for communication between Web services that are vulnerable to various web application threats. Which of the following layer in web services stack is vulnerable to fault code leaks?

Correct Answer: C

QUESTION 19

- (Topic 1)
Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.

Correct Answer: B

QUESTION 20

- (Topic 1)
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has opened with other systems?

Correct Answer: B