ECCouncil EC1-349 Computer Hacking Forensic Practice Exam

';

Sample Questions

Q) Links are files with extension .ink that are created and accessed by users. These files provide information on:

a) System log

b) application running

c) application logs

d) System log

Q) When the indicators of the cluster operating system as used, but do not assign them to any file, these clusters are known as ___________.

a) unused clusters

b) bad clusters

c) empty cluster

d) unused clusters

Q) Quality of a raster image is determined by _________________and the amount of information in each pixel.

a) Image file size

b) Image file format

c) Compression Method

d) Image file size

Q) What is the first step that needs to be done to crack the password?

a) If it matches, which password has been cracked and password cracker displays the clear version of the password

b) The list of the dictionary words is hashed or encrypted

c) The list of words hash is compared to the target of the password hash, usually one word at a time

d) If it matches, which password has been cracked and password cracker displays the clear version of the password

Q) Which Wireless Standard has the bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?

a) 802.11i

b) 802.11b

c) 802.11g

d) 802.11i



