312-49v10 Exam Question 81
Which of the following Android libraries are used to render 2D (SGL) or 3D (OpenGL/ES) graphics content to the screen?
312-49v10 Exam Question 82
One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?
312-49v10 Exam Question 83
Which of the following protocols allows non-ASCII files, such as video, graphics, and audio, to be sent through the email messages?
312-49v10 Exam Question 84
Which of the following commands shows you the names of all open shared files on a server and the number of file locks on each file?
312-49v10 Exam Question 85
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
