ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report Export Collapse

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data.

What method would be most efficient for you to acquire digital evidence from this network?

create a compressed copy of the file with DoubleSpace
create a compressed copy of the file with DoubleSpace
create a sparse data copy of a folder or file
create a sparse data copy of a folder or file
make a bit-stream disk-to-image file
make a bit-stream disk-to-image file
make a bit-stream disk-to-disk file
make a bit-stream disk-to-disk file
Suggested answer: C
asked 18/09/2024
Matias Cordero Ochoa
37 questions

Question 12

Report Export Collapse

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating?

trademark law
trademark law
copyright law
copyright law
printright law
printright law
brandmark law
brandmark law
Suggested answer: A
asked 18/09/2024
Neha Dua
49 questions

Question 13

Report Export Collapse

What file structure database would you expect to find on floppy disks?

NTFS
NTFS
FAT32
FAT32
FAT16
FAT16
FAT12
FAT12
Suggested answer: D
asked 18/09/2024
Matthew Isaacs
47 questions

Question 14

Report Export Collapse

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

digital attack
digital attack
denial of service
denial of service
physical attack
physical attack
ARP redirect
ARP redirect
Suggested answer: B
asked 18/09/2024
Amarjeet Saini
41 questions

Question 15

Report Export Collapse

When examining a file with a Hex Editor, what space does the file header occupy?

the last several bytes of the file
the last several bytes of the file
the first several bytes of the file
the first several bytes of the file
none, file headers are contained in the FAT
none, file headers are contained in the FAT
one byte at the beginning of the file
one byte at the beginning of the file
Suggested answer: D
asked 18/09/2024
Dimitar Krachunov
36 questions

Question 16

Report Export Collapse

In the context of file deletion process, which of the following statement holds true?

When files are deleted, the data is overwritten and the cluster marked as available
When files are deleted, the data is overwritten and the cluster marked as available
The longer a disk is in use, the less likely it is that deleted files will be overwritten
The longer a disk is in use, the less likely it is that deleted files will be overwritten
While booting, the machine may create temporary files that can delete evidence
While booting, the machine may create temporary files that can delete evidence
Secure delete programs work by completely overwriting the file in one go
Secure delete programs work by completely overwriting the file in one go
Suggested answer: C
asked 18/09/2024
AARON MCCOMBS
53 questions

Question 17

Report Export Collapse

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation?

Image the disk and try to recover deleted files
Image the disk and try to recover deleted files
Seek the help of co-workers who are eye-witnesses
Seek the help of co-workers who are eye-witnesses
Check the Windows registry for connection data (you may or may not recover)
Check the Windows registry for connection data (you may or may not recover)
Approach the websites for evidence
Approach the websites for evidence
Suggested answer: A
asked 18/09/2024
Andries Coetzee
33 questions

Question 18

Report Export Collapse

A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

blackout attack
blackout attack
automated attack
automated attack
distributed attack
distributed attack
central processing attack
central processing attack
Suggested answer: B
asked 18/09/2024
Cornelius Paul
41 questions

Question 19

Report Export Collapse

The offset in a hexadecimal code is:

The last byte after the colon
The last byte after the colon
The 0x at the beginning of the code
The 0x at the beginning of the code
The 0x at the end of the code
The 0x at the end of the code
The first byte after the colon
The first byte after the colon
Suggested answer: B
asked 18/09/2024
Sebasteen Lawrance
49 questions

Question 20

Report Export Collapse

It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?

by law, three
by law, three
quite a few
quite a few
only one
only one
at least two
at least two
Suggested answer: C
asked 18/09/2024
Antonios Petropoulos
34 questions
Total 704 questions
Go to page: of 71
Search

Related questions