312-49v10 Exam Question 66
A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?
312-49v10 Exam Question 67
If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?
312-49v10 Exam Question 68
An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,536 bytes. What type of activity is the investigator seeing?
312-49v10 Exam Question 69
Which of the following is a non-zero data that an application allocates on a hard disk cluster in systems running on Windows OS?
312-49v10 Exam Question 70
You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?
