EC-Council recognition is appreciated in buying it career. Owner associated with EC-Council recognition can put to get job everywhere in the world. EC-Council recognition is a brand associated with guarantee. An established will be able to increase his/her capacities which enables it to conveniently increase his/her know-how plus experience using EC-Council. Organizations are trying to find the ones workforce who are properly qualified and get more standard expertise plus capabilities on their arena.
2021 Jan 312-49v8 book
Q71. Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications.
Which data compression technique maintains data integrity?
A. Lossless compression
B. Lossy compression
C. Speech encoding compression
D. Lossy video compression
Answer: A
Q72. Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox, or overwhelm the server where the email address is hosted, to cause a denial-of-service attack?
A. Email spamming
B. Mail bombing
C. Phishing
D. Email spoofing
Answer: B
Q73. What is a SCSI (Small Computer System Interface)?
A. A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners
B. A standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices
C. A "plug-and-play" interface, which allows a device to be added without an adapter card and without rebooting the computer D. A point-to-point serial bi-directional interface for transmitting data between computer devices at data rates of up to 4 Gbps
Answer: A
Q74. Which of the following commands shows you the NetBIOS name table each?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Q75. Which of the following log injection attacks uses white space padding to create unusual log entries?
A. Word wrap abuse attack
B. HTML injection attack
C. Terminal injection attack
D. Timestamp injection attack
Answer: A
Up to the immediate present 312-49v8 actual test:
Q76. Which of the following would you consider an aspect of organizational security, especially focusing on IT security?
A. Biometric information security
B. Security from frauds
C. Application security
D. Information copyright security
Answer: C
Q77. Under no circumstances should anyone, with the exception of qualified computer forensics personnel, make any attempts to restore or recover information from a computer system or device that holds electronic information.
A. True
B. False
Answer: A
Q78. What is the first step that needs to be carried out to crack the password?
A. A word list is created using a dictionary generator program or dictionaries
B. The list of dictionary words is hashed or encrypted
C. The hashed wordlist is compared against the target hashed password, generally one word at a time
D. If it matches, that password has been cracked and the password cracker displays the unencrypted version of the password
Answer: A
Q79. When collecting evidence from the RAM, where do you look for data?
A. Swap file
B. SAM file
C. Data file
D. Log file
Answer: A
Q80. SIM is a removable component that contains essential information about the subscriber. It has both volatile and non-volatile memory. The file system of a SIM resides in _____________ memory.
A. Volatile
B. Non-volatile
Answer: B
see more 312-49v8 dumps
