Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free Access ECCouncil 312-49v10 New Release

Page: 8 / 26
Total 704 questions

Computer Hacking Forensic Investigator (CHFI-v10) Questions and Answers

Question 29

You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?

Options:

A.

Inverse TCP flag scanning

B.

ACK flag scanning

C.

TCP Scanning

D.

IP Fragment Scanning

Question 30

During an investigation, Noel found the following SIM card from the suspect's mobile. What does the code 89 44 represent?

Options:

A.

Issuer Identifier Number and TAC

B.

Industry Identifier and Country code

C.

Individual Account Identification Number and Country Code

D.

TAC and Industry Identifier

Question 31

A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?

Options:

A.

/auth

B.

/proc

C.

/var/log/debug

D.

/var/spool/cron/

Question 32

What does the command “C:\>wevtutil gl ” display?

Options:

A.

Configuration information of a specific Event Log

B.

Event logs are saved in .xml format

C.

Event log record structure

D.

List of available Event Logs

Page: 8 / 26
Total 704 questions