Ethical Hacking and Countermeasures
EC-Council Disaster Recovery Professional v3 (EDRP)
Linux Security
Certified Network Defender (CND)
Certified EC-Council Instructor (CEI)
EC-Council Certified Security Specialist (ECSSv10)Exam
Ethical Hacking and Countermeasures V8
EC-Council Certified CISO (CCISO)
Computer Hacking Forensic Investigator (v9)
EC-Council Information Security Manager (E|ISM)
You should make at least how many bit-stream copies of a suspect drive?
1
2
3
4
What is the advantage in encrypting the communication between the agent and the monitor in an Intrusion Detection System?
Encryption of agent communications will conceal the presence of the agents
Alerts are sent to the monitor when a potential intrusion is detected
An intruder could intercept and delete data or alerts and the intrusion can go undetected
The monitor will know if counterfeit messages are being generated because they will not be encrypted
In the context of file deletion process, which of the following statement holds true?
When files are deleted, the data is overwritten and the cluster marked as available
The longer a disk is inuse, the less likely it is that deleted files will be overwritten
While booting, the machine may create temporary files that can delete evidence
Secure delete programs work by completely overwriting the file in one go