ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

A.
Searching for evidence themselves would not have any ill effects
A.
Searching for evidence themselves would not have any ill effects
Answers
B.
Searching could possibly crash the machine or device
B.
Searching could possibly crash the machine or device
Answers
C.
Searching creates cache files, which would hinder the investigation
C.
Searching creates cache files, which would hinder the investigation
Answers
D.
Searching can change date/time stamps
D.
Searching can change date/time stamps
Answers
Suggested answer: D

In the following directory listing,

Which file should be used to restore archived email messages for someone using Microsoft Outlook?

A.
Outlook bak
A.
Outlook bak
Answers
B.
Outlook ost
B.
Outlook ost
Answers
C.
Outlook NK2
C.
Outlook NK2
Answers
D.
Outlook pst
D.
Outlook pst
Answers
Suggested answer: D

Daryl, a computer forensics investigator, has just arrived at the house of an alleged computer hacker.

Daryl takes pictures and tags all computer and peripheral equipment found in the house. Daryl packs all the items found in his van and takes them back to his lab for further examination. At his lab, Michael his assistant helps him with the investigation. Since Michael is still in training, Daryl supervises all of his work very carefully. Michael is not quite sure about the procedures to copy all the data off the computer and peripheral devices. How many data acquisition tools should Michael use when creating copies of the evidence for the investigation?

A.
Two
A.
Two
Answers
B.
One
B.
One
Answers
C.
Three
C.
Three
Answers
D.
Four
D.
Four
Answers
Suggested answer: A

What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?

A.
Cracks every password in 10 minutes
A.
Cracks every password in 10 minutes
Answers
B.
Distribute processing over 16 or fewer computers
B.
Distribute processing over 16 or fewer computers
Answers
C.
Support for Encrypted File System
C.
Support for Encrypted File System
Answers
D.
Support for MD5 hash verification
D.
Support for MD5 hash verification
Answers
Suggested answer: B

Heather, a computer forensics investigator, is assisting a group of investigators working on a large computer fraud case involving over 20 people. These 20 people, working in different offices, allegedly siphoned off money from many different client accounts. Heather responsibility is to find out how the accused people communicated between each other. She has searched their email and their computers and has not found any useful evidence. Heather then finds some possibly useful evidence under the desk of one of the accused.

In an envelope she finds a piece of plastic with numerous holes cut out of it. Heather then finds the same exact piece of plastic with holes at many of the other accused peoples desks. Heather believes that the 20 people involved in the case were using a cipher to send secret messages in between each other. What type of cipher was used by the accused in this case?

A.
Grill cipher
A.
Grill cipher
Answers
B.
Null cipher
B.
Null cipher
Answers
C.
Text semagram
C.
Text semagram
Answers
D.
Visual semagram
D.
Visual semagram
Answers
Suggested answer: A

What is the smallest physical storage unit on a hard drive?

A.
Track
A.
Track
Answers
B.
Cluster
B.
Cluster
Answers
C.
Sector
C.
Sector
Answers
D.
Platter
D.
Platter
Answers
Suggested answer: C

When needing to search for a website that is no longer present on the Internet today but was online few years back, what site can be used to view the website collection of pages?

A.
Proxify.net
A.
Proxify.net
Answers
B.
Dnsstuff.com
B.
Dnsstuff.com
Answers
C.
Samspade.org
C.
Samspade.org
Answers
D.
Archive.org
D.
Archive.org
Answers
Suggested answer: D

Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?

A.
Typography
A.
Typography
Answers
B.
Steganalysis
B.
Steganalysis
Answers
C.
Picture encoding
C.
Picture encoding
Answers
D.
Steganography
D.
Steganography
Answers
Suggested answer: D

Where does Encase search to recover NTFS files and folders?

A.
MBR
A.
MBR
Answers
B.
MFT
B.
MFT
Answers
C.
Slack space
C.
Slack space
Answers
D.
HAL
D.
HAL
Answers
Suggested answer: B

Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?

22,164 cylinders/disk

80 heads/cylinder

63 sectors/track

A.
53.26 GB
A.
53.26 GB
Answers
B.
57.19 GB
B.
57.19 GB
Answers
C.
11.17 GB
C.
11.17 GB
Answers
D.
10 GB
D.
10 GB
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71