Which of the following steganography types hides the secret message in a specifically designed pattern on the document that is unclear to the average reader?
A. Open code steganography
B. Visual semagrams steganography
C. Text semagrams steganography
D. Technical steganography
Which of the following approaches checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?
A. Graph-based approach
B. Neural network-based approach
C. Rule-based approach
D. Automated field correlation approach
The Recycle Bin is located on the Windows desktop. When you delete an item from the hard disk, Windows sends that deleted item to the Recycle Bin and the icon changes to full from empty, but items deleted from removable media, such as a floppy disk or network drive, are not stored in the Recycle Bin.
What is the size limit for Recycle Bin in Vista and later versions of the Windows?
A. No size limit
B. Maximum of 3.99 GB
C. Maximum of 4.99 GB
D. Maximum of 5.99 GB
P0P3 (Post Office Protocol 3) is a standard protocol for receiving email that deletes mail on the server as soon as the user downloads it. When a message arrives, the POP3 server appends it to the bottom of the recipient's account file, which can be retrieved by the email client at any preferred time. Email client connects to the POP3 server at _______________by default to fetch emails.
A. Port 109
B. Port 110
C. Port 115
D. Port 123
When collecting evidence from the RAM, where do you look for data?
A. Swap file
B. SAM file
C. Data file
D. Log file
When NTFS Is formatted, the format program assigns the __________ sectors to the boot sectors and to the bootstrap code
A. First 12
B. First 16
C. First 22
D. First 24
A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?
A. Plaintext
B. Single pipe character
C. Multiple pipe characters
D. HTML tags
A rogue/unauthorized access point is one that Is not authorized for operation by a particular firm or network
A. True
B. False
The need for computer forensics is highlighted by an exponential increase in the number of cybercrimes and litigations where large organizations were involved. Computer forensics plays an important role in tracking the cyber criminals. The main role of computer forensics is to:
A. Maximize the investigative potential by maximizing the costs
B. Harden organization perimeter security
C. Document monitoring processes of employees of the organization
D. Extract, process, and interpret the factual evidence so that it proves the attacker's actions in the court
You have been given the task to investigate web attacks on a Windows-based server.
Which of the following commands will you use to look at which sessions the machine has opened with other systems?
A. Net sessions
B. Net use
C. Net config
D. Net share
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.