Discount Offer
Go Back on 312-49v9 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

312-49v9 Practice Test


Page 9 out of 98 Pages

Topic 1: Exam Set A

What is a bit-stream copy?


A.

Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of
the original disk


B.

A bit-stream image is the file that contains the NTFS files and folders of all the data on a
disk or partition


C.

A bit-stream image is the file that contains the FAT32 files and folders of all the data on
a disk or partition


D.

Creating a bit-stream image transfers only non-deleted files from the original disk to the
image disk





A.
  

Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of
the original disk



Task list command displays a list of applications and services with their Process ID (PID)
for all tasks running on either a local or a remote computer.
Which of the following task list commands provides information about the listed processes,
including the image name, PID, name, and number of the session for the process?


A.

tasklist/s


B.

tasklist/u


C.

 tasklist/p


D.

tasklist/V





D.
  

tasklist/V



Wireless network discovery tools use two different methodologies to detect, monitor and
log a WLAN device (i.e. active scanning and passive scanning). Active scanning
methodology involves ____________and waiting for responses from available wireless
networks.


A.

Broadcasting a probe request frame


B.

Sniffing the packets from the airwave


C.

Scanning the network


D.

Inspecting WLAN and surrounding networks





A.
  

Broadcasting a probe request frame



Netstat is a tool for collecting Information regarding network connections. It provides a
simple view of TCP and UDP connections, and their state and network traffic statistics.
Which of the following commands shows you the TCP and UDP network connections,
listening ports, and the identifiers?


A.

netstat -ano


B.

netstat -b


C.

netstat -r


D.

netstat -s





A.
  

netstat -ano



Networks are vulnerable to an attack which occurs due to overextension of bandwidth,
bottlenecks, network data interception, etc.
Which of the following network attacks refers to a process in which an attacker changes his
or her IP address so that he or she appears to be someone else?


A.

IP address spoofing


B.

Man-in-the-middle attack


C.

Denial of Service attack


D.

Session sniffing





A.
  

IP address spoofing




Page 9 out of 98 Pages
Previous