ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

A.
Use VMware to be able to capture the data in memory and examine it
A.
Use VMware to be able to capture the data in memory and examine it
Answers
B.
Give the Operating System a minimal amount of memory, forcing it to use a swap file
B.
Give the Operating System a minimal amount of memory, forcing it to use a swap file
Answers
C.
Create a Separate partition of several hundred megabytes and place the swap file there
C.
Create a Separate partition of several hundred megabytes and place the swap file there
Answers
D.
Use intrusion forensic techniques to study memory resident infections
D.
Use intrusion forensic techniques to study memory resident infections
Answers
Suggested answer: C

You are working in the security Department of law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?

A.
10
A.
10
Answers
B.
25
B.
25
Answers
C.
110
C.
110
Answers
D.
135
D.
135
Answers
Suggested answer: B

This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

A.
Master Boot Record (MBR)
A.
Master Boot Record (MBR)
Answers
B.
Master File Table (MFT)
B.
Master File Table (MFT)
Answers
C.
File Allocation Table (FAT)
C.
File Allocation Table (FAT)
Answers
D.
Disk Operating System (DOS)
D.
Disk Operating System (DOS)
Answers
Suggested answer: C

What should you do when approached by a reporter about a case that you are working on or have worked on?

A.
Refer the reporter to the attorney that retained you
A.
Refer the reporter to the attorney that retained you
Answers
B.
Say, "no comment"
B.
Say, "no comment"
Answers
C.
Answer all the reporter's questions as completely as possible
C.
Answer all the reporter's questions as completely as possible
Answers
D.
Answer only the questions that help your case
D.
Answer only the questions that help your case
Answers
Suggested answer: A

Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?

A.
Sector
A.
Sector
Answers
B.
Metadata
B.
Metadata
Answers
C.
MFT
C.
MFT
Answers
D.
Slack Space
D.
Slack Space
Answers
Suggested answer: D

A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?

A.
They examined the actual evidence on an unrelated system
A.
They examined the actual evidence on an unrelated system
Answers
B.
They attempted to implicate personnel without proof
B.
They attempted to implicate personnel without proof
Answers
C.
They tampered with evidence by using it
C.
They tampered with evidence by using it
Answers
D.
They called in the FBI without correlating with the fingerprint data
D.
They called in the FBI without correlating with the fingerprint data
Answers
Suggested answer: C

When investigating a Windows System, it is important to view the contents of the page or swap file because:

A.
Windows stores all of the systems configuration information in this file
A.
Windows stores all of the systems configuration information in this file
Answers
B.
This is file that windows use to communicate directly with Registry
B.
This is file that windows use to communicate directly with Registry
Answers
C.
A Large volume of data can exist within the swap file of which the computer user has no knowledge
C.
A Large volume of data can exist within the swap file of which the computer user has no knowledge
Answers
D.
This is the file that windows use to store the history of the last 100 commands that were run from the command line
D.
This is the file that windows use to store the history of the last 100 commands that were run from the command line
Answers
Suggested answer: C

Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual medi a. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?

A.
Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media
A.
Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media
Answers
B.
Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence
B.
Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence
Answers
C.
Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
C.
Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
Answers
D.
Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media
D.
Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media
Answers
Suggested answer: B

The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company's intranet, network or Virtual Private Network (VPN) and will allow the company's investigators to monitor, search and retrieve information stored within the network.

A.
Right to work
A.
Right to work
Answers
B.
Right of free speech
B.
Right of free speech
Answers
C.
Right to Internet Access
C.
Right to Internet Access
Answers
D.
Right of Privacy
D.
Right of Privacy
Answers
Suggested answer: D

What does mactime, an essential part of the coroner's toolkit do?

A.
It traverses the file system and produces a listing of all files based on the modification, access and change timestamps
A.
It traverses the file system and produces a listing of all files based on the modification, access and change timestamps
Answers
B.
It can recover deleted file space and search it for data. However, it does not allow the investigator to preview them
B.
It can recover deleted file space and search it for data. However, it does not allow the investigator to preview them
Answers
C.
The tools scans for i-node information, which is used by other tools in the tool kit
C.
The tools scans for i-node information, which is used by other tools in the tool kit
Answers
D.
It is too specific to the MAC OS and forms a core component of the toolkit
D.
It is too specific to the MAC OS and forms a core component of the toolkit
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71