You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firm's employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?
A. Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned
B. Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies
C. Inform the owner that conducting an investigation without a policy is a violation of the employees' expectation of privacy
D. Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment
正解:C
質問 2:
What file structure database would you expect to find on floppy disks?
A. FAT12
B. FAT32
C. NTFS
D. FAT16
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
What is a SCSI (Small Computer System Interface)?
A. A standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices
B. A point-to-point serial bi-directional interface for transmitting data between computer devices at data rates of up to 4 Gbps
C. A "plug-and-play" interface, which allows a device to be added without an adapter card and without rebooting the computer
D. A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners
正解:D
質問 4:
What operating system would respond to the following command?
C:\> nmap -sW 10.10.145.65
A. Windows XP
B. FreeBSD
C. Mac OS X
D. Windows 95
正解:B
質問 5:
Buffer Overflow occurs when an application writes more data to a block of memory, or buffer, than the buffer is allocated to hold. Buffer overflow attacks allow an attacker to modify the
_______________in order to control the process execution, crash the process and modify internal variables.
A. Target remote access
B. Target process's address space
C. Target rainbow table
D. Target SAM file
正解:B
質問 6:
One way to identify the presence of hidden partitions on a suspect hard drive is to:One way to identify the presence of hidden partitions on a suspect? hard drive is to:
A. Add up the total size of all known partitions and compare it to the total size of the hard drive
B. Examine the LILO and note an ?in the artition Type?fieldExamine the LILO and note an ??in the ?artition Type?field
C. It is not possible to have hidden partitions on a hard drive
D. Examine the FAT and identify hidden partitions by noting an ?in the artition Type?fieldExamine the FAT and identify hidden partitions by noting an ??in the ?artition Type?field
正解:A
岛田** -
このEC0-349は初心者にとってはわかりやすい素晴らしい問題集になっております。試験に受かりましたよ。