Question 109

- (Topic 3)
If you discover a criminal act while investigating a corporate policy abuse, it becomes a public-sector investigation and should be referred to law enforcement?

Correct Answer:A

Question 110

- (Topic 3)
You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour.
Why were these passwords cracked so Quickly?

Correct Answer:A

Question 111

- (Topic 3)
You are assisting in the investigation of a possible Web Server hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a pornographic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

Correct Answer:B

Question 112

- (Topic 3)
Where are files temporarily written in Unix when printing?

Correct Answer:D

Question 113

- (Topic 1)
Buffer Overflow occurs when an application writes more data to a block of memory, or buffer, than the buffer is allocated to hold. Buffer overflow attacks allow an attacker to modify the ___ in order to control the process execution, crash the process and modify internal variables.

Correct Answer:A

Question 114

- (Topic 1)
What is cold boot (hard boot)?

Correct Answer:A

START 312-49v9 EXAM