Exam Name: | Computer Hacking Forensic Investigator (v9) | ||
Exam Code: | 312-49v9 Dumps | ||
Vendor: | ECCouncil | Certification: | CHFIv9 |
Questions: | 589 Q&A's | Shared By: | leena |
After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?
Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?
Which of the following Event Correlation Approach is an advanced correlation method that assumes and predicts what an attacker can do next after the attack by studying the statistics and probability and uses only two variables?
Which of the following is a record of the characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups?