Which of the following standard is based on a legal precedent regarding the admissibility of scientific examinations or experiments in legal cases?
A. Daubert Standard
B. Schneiderman Standard
C. Frye Standard
D. FERPA standard
Which device in a wireless local area network (WLAN) determines the next network point to which a packet should be forwarded toward its destination?
A. Wireless router
B. Wireless modem
C. Antenna
D. Mobile station
Which of the following attacks allows attacker to acquire access to the communication channels between the victim and server to extract the information?
A. Man-in-the-middle (MITM) attack
B. Replay attack
C. Rainbow attack
D. Distributed network attack
First response to an incident may involve three different groups of people, and each will have differing skills and need to carry out differing tasks based on the incident. Who is responsible for collecting, preserving, and packaging electronic evidence?
A. System administrators
B. Local managers or other non-forensic staff
C. Forensic laboratory staff
D. Lawyers
Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11i
Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.
A. True
B. False
Attacker uses vulnerabilities in the authentication or session management functions such as exposed accounts, session IDs, logout, password management, timeouts, remember me. secret question, account update etc. to impersonate users, if a user simply closes the browser without logging out from sites accessed through a public computer, attacker can use the same browser later and exploit the user's privileges. Which of the following vulnerability/exploitation is referred above?
A. Session ID in URLs
B. Timeout Exploitation
C. I/O exploitation
D. Password Exploitation
What is a first sector ("sector zero") of a hard disk?
A. Master boot record
B. System boot record
C. Secondary boot record
D. Hard disk boot record
What is the smallest allocation unit of a hard disk?
A. Cluster
B. Spinning tracks
C. Disk platters
D. Slack space
Data files from original evidence should be used for forensics analysis
A. True
B. False
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.