Question 61

- (Topic 1)
In Windows 7 system files, which file reads the Boot.ini file and loads Ntoskrnl.exe. Bootvid.dll. Hal.dll, and boot-start device drivers?

Correct Answer:A

Question 62

- (Topic 1)
The evolution of web services and their increasing use in business offers new attack vectors in an application framework. Web services are based on XML protocols such as web Services Definition Language (WSDL) for describing the connection points, Universal Description, Discovery, and Integration (UDDI) for the description and discovery of Web services and Simple Object Access Protocol (SOAP) for communication between Web services that are vulnerable to various web application threats. Which of the following layer in web services stack is vulnerable to fault code leaks?

Correct Answer:C

Question 63

- (Topic 3)
After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

Correct Answer:A

Question 64

- (Topic 3)
Which of the following should a computer forensics lab used for investigations have?

Correct Answer:B

Question 65

- (Topic 1)
A steganographic file system is a method to store the files in a way that encrypts and hides the data without the knowledge of others

Correct Answer:A

Question 66

- (Topic 1)
JPEG is a commonly used method of compressing photographic Images. It uses a compression algorithm to minimize the size of the natural image, without affecting the quality of the image. The JPEG lossy algorithm divides the image in separate blocks of ____.

Correct Answer:B

START 312-49v9 EXAM