ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 22

Question list
Search
Search

Related questions











What type of equipment would a forensics investigator store in a StrongHold bag?

A.
PDAPDA?
A.
PDAPDA?
Answers
B.
Backup tapes
B.
Backup tapes
Answers
C.
Hard drives
C.
Hard drives
Answers
D.
Wireless cards
D.
Wireless cards
Answers
Suggested answer: D

If you are concerned about a high level of compression but not concerned about any possible data loss, what type of compression would you use?

A.
Lossful compression
A.
Lossful compression
Answers
B.
Lossy compression
B.
Lossy compression
Answers
C.
Lossless compression
C.
Lossless compression
Answers
D.
Time-loss compression
D.
Time-loss compression
Answers
Suggested answer: B

When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote?

A.
The year the evidence was taken
A.
The year the evidence was taken
Answers
B.
The sequence number for the parts of the same exhibit
B.
The sequence number for the parts of the same exhibit
Answers
C.
The initials of the forensics analyst
C.
The initials of the forensics analyst
Answers
D.
The sequential number of the exhibits seized
D.
The sequential number of the exhibits seized
Answers
Suggested answer: D

An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,536 bytes. What type of activity is the investigator seeing?

A.
Smurf
A.
Smurf
Answers
B.
Ping of death
B.
Ping of death
Answers
C.
Fraggle
C.
Fraggle
Answers
D.
Nmap scan
D.
Nmap scan
Answers
Suggested answer: B

When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?

A.
All virtual memory will be deleted
A.
All virtual memory will be deleted
Answers
B.
The wrong partition may be set to active
B.
The wrong partition may be set to active
Answers
C.
This action can corrupt the disk
C.
This action can corrupt the disk
Answers
D.
The computer will be set in a constant reboot state
D.
The computer will be set in a constant reboot state
Answers
Suggested answer: C

When using an iPod and the host computer is running Windows, what file system will be used?

A.
iPod+
A.
iPod+
Answers
B.
HFS
B.
HFS
Answers
C.
FAT16
C.
FAT16
Answers
D.
FAT32
D.
FAT32
Answers
Suggested answer: D

What is one method of bypassing a system BIOS password?

A.
Removing the processor
A.
Removing the processor
Answers
B.
Removing the CMOS battery
B.
Removing the CMOS battery
Answers
C.
Remove all the system memory
C.
Remove all the system memory
Answers
D.
Login to Windows and disable the BIOS password
D.
Login to Windows and disable the BIOS password
Answers
Suggested answer: B

What technique used by Encase makes it virtually impossible to tamper with evidence once it has been acquired?

A.
Every byte of the file(s) is given an MD5 hash to match against a master file
A.
Every byte of the file(s) is given an MD5 hash to match against a master file
Answers
B.
Every byte of the file(s) is verified using 32-bit CRC
B.
Every byte of the file(s) is verified using 32-bit CRC
Answers
C.
Every byte of the file(s) is copied to three different hard drives
C.
Every byte of the file(s) is copied to three different hard drives
Answers
D.
Every byte of the file(s) is encrypted using three different methods
D.
Every byte of the file(s) is encrypted using three different methods
Answers
Suggested answer: B

What must an investigator do before disconnecting an iPod from any type of computer?

A.
Unmount the iPod
A.
Unmount the iPod
Answers
B.
Mount the iPod
B.
Mount the iPod
Answers
C.
Disjoin the iPod
C.
Disjoin the iPod
Answers
D.
Join the iPod
D.
Join the iPod
Answers
Suggested answer: A

The following is a log file screenshot from a default installation of IIS 6.0.

What time standard is used by IIS as seen in the screenshot?

A.
UTC
A.
UTC
Answers
B.
GMT
B.
GMT
Answers
C.
TAI
C.
TAI
Answers
D.
UT
D.
UT
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71