AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For ECCouncil- EC0-349





Question ID 21268

When investigating a Windows system, it is important to view the contents of the "page" or "swap" file because:

Option A

Windows stores all of the systems configuration information in this file

Option B

a large volume of data can exist within the swap file of which the computer user has no knowledge

Option C

this is the file that Windows uses to store the history of the last 100 commands that were run from the
command line

Option D

this is the file that Windows uses to communicate directly with the Registry

Correct Answer B
Explanation


Question ID 21269

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their
pervious activity. After a computer has been compromised by a hacker, which of the following would be most
important in forming a profile of the incident?

Option A

The nature of the attack

Option B

The vulnerability exploited in the incident

Option C

The manufacture of the system compromised

Option D

The logic, formatting and elegance of the code used in the attack

Correct Answer D
Explanation

Send email to admin@getfreedumps for new dumps request!!!