312-49v10 Exam Question 181

MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network.
  • 312-49v10 Exam Question 182

    Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?
  • 312-49v10 Exam Question 183

    In a computer that has Dropbox client installed, which of the following files related to the Dropbox client store information about local Dropbox installation and the Dropbox user account, along with email IDs linked with the account?
  • 312-49v10 Exam Question 184

    During a forensic investigation, a large number of files were collected. The investigator needs to evaluate ownership and accountability of those files. Therefore, he begins to Identify attributes such as "author name," "organization name." "network name," or any additional supporting data that is meant for the owner's Identification purpose. Which term describes these attributes?
  • 312-49v10 Exam Question 185

    In the context of file deletion process, which of the following statement holds true?