ECCouncil Related Exams
412-79 Exam
Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protecteD. What are two common methods used by password cracking software that you can use to obtain the password?
What is the advantage in encrypting the communication between the agent and the monitor in an Intrusion Detection System?