Free 312-49v9 Exam Dumps

Question 66

- (Topic 1)
In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?

Correct Answer:D

Question 67

- (Topic 3)
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

Correct Answer:B

Question 68

- (Topic 1)
Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.

Correct Answer:A

Question 69

- (Topic 1)
System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to function

Correct Answer:A

Question 70

- (Topic 1)
Which of the following commands shows you the names of all open shared files on a server and number of file locks on each file?

Correct Answer:B