ECSS.pdf - ECCouncil ECSS EC-Council Certified Security Specialist http\/killexams.com\/exam-detail\/ECSS ECSS QUESTION 329 Which of the following forensic

ECSS.pdf - ECCouncil ECSS EC-Council Certified Security...

This preview shows page 1 - 4 out of 5 pages.

ECSS ECCouncil EC-Council Certified Security Specialist
Image of page 1
ECSS QUESTION: 329 Which of the following forensic tool suite is developed for Linux operating system? A. MForensicsLab B. S.M.A.R.T. C. Wetstone D. ProDiscover Answer: B QUESTION: 330 Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems? A. Containment B. Detection C. Preparation D. Eradication Answer: A QUESTION: 331 Which of the following is a transport layer circuit-level proxy server? A. Bastion host B. UDP proxy C. SOCKS D. Forced proxy Answer: C QUESTION: 332 What is the size of Master Boot Record (MBR)? A. 512 bytes B. 256 bytes C. 1 KB 107
Image of page 2
ECSS D. 2 KB Answer: A QUESTION: 333 Which of the following commands is used to test a network connection? A. Popd B. Path C. Perfmon D. Ping Answer: D QUESTION: 334 Which of the following statements is true about a honeyfarm?
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 5 pages?

  • Fall '20
  • IP address, Master boot record, following steps

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture