312-49v10 Exam Question 1

The process of restarting a computer that is already turned on through the operating system is called?
  • 312-49v10 Exam Question 2

    To preserve digital evidence, an investigator should ____________________.
  • 312-49v10 Exam Question 3

    After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?
  • 312-49v10 Exam Question 4

    Which program uses different techniques to conceal a malware's code, thereby making it difficult for security mechanisms to detect or remove it?
  • 312-49v10 Exam Question 5

    According to RFC 3227, which of the following is considered as the most volatile item on a typical system?