ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?

A.
mcopy
A.
mcopy
Answers
B.
image
B.
image
Answers
C.
MD5
C.
MD5
Answers
D.
dd
D.
dd
Answers
Suggested answer: D

To preserve digital evidence, an investigator should ____________________.

A.
Make two copies of each evidence item using a single imaging tool
A.
Make two copies of each evidence item using a single imaging tool
Answers
B.
Make a single copy of each evidence item using an approved imaging tool
B.
Make a single copy of each evidence item using an approved imaging tool
Answers
C.
Make two copies of each evidence item using different imaging tools
C.
Make two copies of each evidence item using different imaging tools
Answers
D.
Only store the original evidence item
D.
Only store the original evidence item
Answers
Suggested answer: C

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

A.
The manufacturer of the system compromised
A.
The manufacturer of the system compromised
Answers
B.
The logic, formatting and elegance of the code used in the attack
B.
The logic, formatting and elegance of the code used in the attack
Answers
C.
The nature of the attack
C.
The nature of the attack
Answers
D.
The vulnerability exploited in the incident
D.
The vulnerability exploited in the incident
Answers
Suggested answer: B

Printing under a Windows Computer normally requires which one of the following files types to be created?

A.
EME
A.
EME
Answers
B.
MEM
B.
MEM
Answers
C.
EMF
C.
EMF
Answers
D.
CME
D.
CME
Answers
Suggested answer: C

An Expert witness give an opinion if:

A.
The Opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors
A.
The Opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors
Answers
B.
To define the issues of the case for determination by the finder of fact
B.
To define the issues of the case for determination by the finder of fact
Answers
C.
To stimulate discussion between the consulting expert and the expert witness
C.
To stimulate discussion between the consulting expert and the expert witness
Answers
D.
To deter the witness form expanding the scope of his or her investigation beyond the requirements of the case
D.
To deter the witness form expanding the scope of his or her investigation beyond the requirements of the case
Answers
Suggested answer: A

When using Windows acquisitions tools to acquire digital evidence, it is important to use a welltested hardware write-blocking device to:

A.
Automate Collection from image files
A.
Automate Collection from image files
Answers
B.
Avoiding copying data from the boot partition
B.
Avoiding copying data from the boot partition
Answers
C.
Acquire data from host-protected area on a disk
C.
Acquire data from host-protected area on a disk
Answers
D.
Prevent Contamination to the evidence drive
D.
Prevent Contamination to the evidence drive
Answers
Suggested answer: D

Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?

A.
Globally unique ID
A.
Globally unique ID
Answers
B.
Microsoft Virtual Machine Identifier
B.
Microsoft Virtual Machine Identifier
Answers
C.
Personal Application Protocol
C.
Personal Application Protocol
Answers
D.
Individual ASCII string
D.
Individual ASCII string
Answers
Suggested answer: A

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on the hard disk?

A.
Throw the hard disk into the fire
A.
Throw the hard disk into the fire
Answers
B.
Run the powerful magnets over the hard disk
B.
Run the powerful magnets over the hard disk
Answers
C.
Format the hard disk multiple times using a low level disk utility
C.
Format the hard disk multiple times using a low level disk utility
Answers
D.
Overwrite the contents of the hard disk with Junk data
D.
Overwrite the contents of the hard disk with Junk data
Answers
Suggested answer: A

You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

A.
The X509 Address
A.
The X509 Address
Answers
B.
The SMTP reply Address
B.
The SMTP reply Address
Answers
C.
The E-mail Header
C.
The E-mail Header
Answers
D.
The Host Domain Name
D.
The Host Domain Name
Answers
Suggested answer: C

You are working as a Computer forensics investigator for a corporation on a computer abuse case.

You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject's computer. You inform the officer that you will not be able to comply with that request because doing so would:

A.
Violate your contract
A.
Violate your contract
Answers
B.
Cause network congestion
B.
Cause network congestion
Answers
C.
Make you an agent of law enforcement
C.
Make you an agent of law enforcement
Answers
D.
Write information to the subject's hard drive
D.
Write information to the subject's hard drive
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71