Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

ECCouncil Computer Hacking Forensic Investigator

Last Update 19 hours ago Total Questions : 150

The ECCouncil Computer Hacking Forensic Investigator content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include EC0-349 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our EC0-349 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these EC0-349 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any ECCouncil Computer Hacking Forensic Investigator practice test comfortably within the allotted time.

Question # 41

You are assisting in the investigation of a possible Web Server hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a pornographic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

A.

ARP Poisoning

B.

DNS Poisoning

C.

HTTP redirect attack

D.

IP Spoofing

Question # 42

What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?

A.

Fraggle

B.

Smurf scan

C.

SYN flood

D.

Teardrop

Question # 43

Microsoft Outlook maintains email messages in a proprietary format in what type of file?

A.

.email

B.

.mail

C.

.pst

D.

.doc

Question # 44

What should you do when approached by a reporter about a case that you are working on or have worked on?

A.

Refer the reporter to the attorney that retained you

B.

Say, o comment?Say, ?o comment

C.

Answer all the reporter questions as completely as possibleAnswer all the reporter? questions as completely as possible

D.

Answer only the questions that help your case

Question # 45

Why would you need to find out the gateway of a device when investigating a wireless attack?

A.

The gateway will be the IP of the proxy server used by the attacker to launch the attack

B.

The gateway will be the IP of the attacker computerThe gateway will be the IP of the attacker? computer

C.

The gateway will be the IP used to manage the RADIUS server

D.

The gateway will be the IP used to manage the access point

Go to page: