ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions











Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic format should Travis send this report?

A.
TIFF-8
A.
TIFF-8
Answers
B.
DOC
B.
DOC
Answers
C.
WPD
C.
WPD
Answers
D.
PDF
D.
PDF
Answers
Suggested answer: D

A forensics investigator is searching the hard drive of a computer for files that were recently moved to the Recycle Bin. He searches for files in C:\RECYCLED using a command line tool but does not find anything. What is the reason for this?

A.
He should search in C:\Windows\System32\RECYCLED folder
A.
He should search in C:\Windows\System32\RECYCLED folder
Answers
B.
The Recycle Bin does not exist on the hard drive
B.
The Recycle Bin does not exist on the hard drive
Answers
C.
The files are hidden and he must use switch to view them
C.
The files are hidden and he must use switch to view them
Answers
D.
Only FAT system contains RECYCLED folder and not NTFS
D.
Only FAT system contains RECYCLED folder and not NTFS
Answers
Suggested answer: C

Why should you never power on a computer that you need to acquire digital evidence from?

A.
When the computer boots up, files are written to the computer rendering the data nclean
A.
When the computer boots up, files are written to the computer rendering the data nclean
Answers
B.
When the computer boots up, the system cache is cleared which could destroy evidence
B.
When the computer boots up, the system cache is cleared which could destroy evidence
Answers
C.
When the computer boots up, data in the memory buffer is cleared which could destroy evidence
C.
When the computer boots up, data in the memory buffer is cleared which could destroy evidence
Answers
D.
Powering on a computer has no affect when needing to acquire digital evidence from it
D.
Powering on a computer has no affect when needing to acquire digital evidence from it
Answers
Suggested answer: A

What is the slave device connected to the secondary IDE controller on a Linux OS referred to?

A.
hda
A.
hda
Answers
B.
hdd
B.
hdd
Answers
C.
hdb
C.
hdb
Answers
D.
hdc
D.
hdc
Answers
Suggested answer: B

What will the following command accomplish? dd if=/dev/xxx of=mbr.backup bs=512 count=1

A.
Back up the master boot record
A.
Back up the master boot record
Answers
B.
Restore the master boot record
B.
Restore the master boot record
Answers
C.
Mount the master boot record on the first partition of the hard drive
C.
Mount the master boot record on the first partition of the hard drive
Answers
D.
Restore the first 512 bytes of the first partition of the hard drive
D.
Restore the first 512 bytes of the first partition of the hard drive
Answers
Suggested answer: A

Preparing an image drive to copy files to is the first step in Linux forensics. For this purpose, what would the following command accomplish? dcfldd if=/dev/zero of=/dev/hda bs=4096 conv=noerror, sync

A.
Fill the disk with zeros
A.
Fill the disk with zeros
Answers
B.
Low-level format
B.
Low-level format
Answers
C.
Fill the disk with 4096 zeros
C.
Fill the disk with 4096 zeros
Answers
D.
Copy files from the master disk to the slave disk on the secondary IDE controller
D.
Copy files from the master disk to the slave disk on the secondary IDE controller
Answers
Suggested answer: A

A picture file is recovered from a computer under investigation. During the investigation process, the file is enlarged 500% to get a better view of its contents. The picture quality is not degraded at all from this process. What kind of picture is this file. What kind of picture is this file?

A.
Raster image
A.
Raster image
Answers
B.
Vector image
B.
Vector image
Answers
C.
Metafile image
C.
Metafile image
Answers
D.
Catalog image
D.
Catalog image
Answers
Suggested answer: B

What advantage does the tool Evidor have over the built-in Windows search?

A.
It can find deleted files even after they have been physically removed
A.
It can find deleted files even after they have been physically removed
Answers
B.
It can find bad sectors on the hard drive
B.
It can find bad sectors on the hard drive
Answers
C.
It can search slack space
C.
It can search slack space
Answers
D.
It can find files hidden within ADS
D.
It can find files hidden within ADS
Answers
Suggested answer: C

An on-site incident response team is called to investigate an alleged case of computer tampering within their company. Before proceeding with the investigation, the CEO informs them that the incident will be classified as low level. How long will the team have to respond to the incident?

A.
One working day
A.
One working day
Answers
B.
Two working days
B.
Two working days
Answers
C.
Immediately
C.
Immediately
Answers
D.
Four hours
D.
Four hours
Answers
Suggested answer: A

What type of attack sends SYN requests to a target system with spoofed IP addresses?

A.
SYN flood
A.
SYN flood
Answers
B.
Ping of death
B.
Ping of death
Answers
C.
Cross site scripting
C.
Cross site scripting
Answers
D.
Land
D.
Land
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71