Question 121

- (Topic 3)
Where is the startup configuration located on a router?

Correct Answer:C

Question 122

- (Topic 2)
What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?

Correct Answer:B

Question 123

- (Topic 1)
Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?

Correct Answer:A

Question 124

- (Topic 1)
Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___ to transfer log messages in a clear text format.

Correct Answer:A

Question 125

- (Topic 3)
James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

Correct Answer:B
The Fraggle attack is like a smurf attack, but uses UDP packets and not ICMP.

Question 126

- (Topic 2)
An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs (DVDs) by using a large magnet. You inform him that this method will not be effective in wiping out the data because CDs and DVDs are ____ media used to store large amounts of data and are not affected by the magnet.

Correct Answer:B

START 312-49v9 EXAM