ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











Jack Smith is a forensics investigator who works for Mason Computer Investigation Services. He is investigating a computer that was infected by Ramen Virus.

He runs the netstat command on the machine to see its current connections. In the following screenshot, what do the 0.0.0.0 IP addresses signify?

A.
Those connections are established
A.
Those connections are established
Answers
B.
Those connections are in listening mode
B.
Those connections are in listening mode
Answers
C.
Those connections are in closed/waiting mode
C.
Those connections are in closed/waiting mode
Answers
D.
Those connections are in timed out/waiting mode
D.
Those connections are in timed out/waiting mode
Answers
Suggested answer: B

What type of flash memory card comes in either Type I or Type II and consumes only five percent of the power required by small hard drives?

A.
SD memory
A.
SD memory
Answers
B.
CF memory
B.
CF memory
Answers
C.
MMC memory
C.
MMC memory
Answers
D.
SM memory
D.
SM memory
Answers
Suggested answer: B

Julie is a college student majoring in Information Systems and Computer Science. She is currently writing an essay for her computer crimes class. Julie paper focuses on white-collar crimes in America and how forensics investigators investigate the cases. Julie would like to focus the subject. Julie would like to focus the subject of the essay on the most common type of crime found in corporate Americ a. What crime should Julie focus on?

A.
Physical theft
A.
Physical theft
Answers
B.
Copyright infringement
B.
Copyright infringement
Answers
C.
Industrial espionage
C.
Industrial espionage
Answers
D.
Denial of Service attacks
D.
Denial of Service attacks
Answers
Suggested answer: C

A forensics investigator needs to copy data from a computer to some type of removable media so he can examine the information at another location. The problem is that the data is around 42GB in size.

What type of removable media could the investigator use?

A.
Blu-Ray single-layer
A.
Blu-Ray single-layer
Answers
B.
HD-DVD
B.
HD-DVD
Answers
C.
Blu-Ray dual-layer
C.
Blu-Ray dual-layer
Answers
D.
DVD-18
D.
DVD-18
Answers
Suggested answer: C

Steven has been given the task of designing a computer forensics lab for the company he works for.

He has found documentation on all aspects of how to design a lab except the number of exits needed. How many exits should Steven include in his design for the computer forensics lab?

A.
Three
A.
Three
Answers
B.
One
B.
One
Answers
C.
Two
C.
Two
Answers
D.
Four
D.
Four
Answers
Suggested answer: B

You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

A.
Network
A.
Network
Answers
B.
Transport
B.
Transport
Answers
C.
Data Link
C.
Data Link
Answers
D.
Session
D.
Session
Answers
Suggested answer: A

Which forensic investigating concept trails the whole incident from how the attack began to how the victim was affected?

A.
Point-to-point
A.
Point-to-point
Answers
B.
End-to-end
B.
End-to-end
Answers
C.
Thorough
C.
Thorough
Answers
D.
Complete event analysis
D.
Complete event analysis
Answers
Suggested answer: B

Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?

A.
Network
A.
Network
Answers
B.
Transport
B.
Transport
Answers
C.
Physical
C.
Physical
Answers
D.
Data Link
D.
Data Link
Answers
Suggested answer: C

Where are files temporarily written in Unix when printing?

A.
/usr/spool
A.
/usr/spool
Answers
B.
/var/print
B.
/var/print
Answers
C.
/spool
C.
/spool
Answers
D.
/var/spool
D.
/var/spool
Answers
Suggested answer: D

All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?

A.
Blackberry Message Center
A.
Blackberry Message Center
Answers
B.
Microsoft Exchange
B.
Microsoft Exchange
Answers
C.
Blackberry WAP gateway
C.
Blackberry WAP gateway
Answers
D.
Blackberry WEP gateway
D.
Blackberry WEP gateway
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71