ECSS ECCouncil EC-Council Certified Security Specialist
ECSS QUESTION: 329 Which of the following forensic tool suite is developed for Linux operating system? A. MForensicsLab B. S.M.A.R.T. C. Wetstone D. ProDiscover Answer: B QUESTION: 330 Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems? A. Containment B. Detection C. Preparation D. Eradication Answer: A QUESTION: 331 Which of the following is a transport layer circuit-level proxy server? A. Bastion host B. UDP proxy C. SOCKS D. Forced proxy Answer: C QUESTION: 332 What is the size of Master Boot Record (MBR)? A. 512 bytes B. 256 bytes C. 1 KB 107
ECSS D. 2 KB Answer: A QUESTION: 333 Which of the following commands is used to test a network connection? A. Popd B. Path C. Perfmon D. Ping Answer: D QUESTION: 334 Which of the following statements is true about a honeyfarm?
You've reached the end of your free preview.
Want to read all 5 pages?
- Fall '20
- IP address, Master boot record, following steps