New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free Access ECCouncil 312-49v9 New Release

Page: 11 / 22
Total 589 questions

Computer Hacking Forensic Investigator (v9) Questions and Answers

Question 41

At what layer does a cross site scripting attack occur on?

Options:

A.

Presentation

B.

Application

C.

Session

D.

Data Link

Question 42

Annie is searching for certain deleted files on a system running Windows XP OS. Where will she find the files if they were not completely deleted from the system?

Options:

A.

C: $Recycled.Bin

B.

C: \$Recycle.Bin

C.

C:\RECYCLER

D.

C:\$RECYCLER

Question 43

To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?

Options:

A.

Post-investigation Phase

B.

Reporting Phase

C.

Pre-investigation Phase

D.

Investigation Phase

Question 44

Which of the following tool captures and allows you to interactively browse the traffic on a network?

Options:

A.

Security Task Manager

B.

Wireshark

C.

ThumbsDisplay

D.

RegScanner

Page: 11 / 22
Total 589 questions