Category «312-49»

Exam 312-49: EC Council Computer Hacking Forensic Investigator

Which of the following wireless access control attacks

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures suchas AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allowthe attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of theorganization to connect to …

Who is responsible for the following tasks?

Who is responsible for the following tasks?Secure the scene and ensure that is maintained in a secure state until the Forensic Team advisesMake notes about the scene that will eventually be handed over to the Forensic Team A. Non-forensics staff B. Lawyers C. System administrators D. Local managers or other non-forensic staff Show Answer

Which network attack is described by the following statement?

Which network attack is described by the following statement?“At least five Russian major banks came under a continuous hacker attack, although online client serviceswere not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in30 countries.” A. DDoS B. Sniffer Attack C. Buffer Overflow D. Man-in-the-Middle Attack Show Answer