ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 31

Question list
Search
Search

List of questions

Search

Related questions











When reviewing web logs, you see an entry for resource not found in the HTTP status code field.

What is the actual error code that you would see in the log for resource not found?

A.
202
A.
202
Answers
B.
404
B.
404
Answers
C.
606
C.
606
Answers
D.
999
D.
999
Answers
Suggested answer: B

What stage of the incident handling process involves reporting events?

A.
Containment
A.
Containment
Answers
B.
Follow-up
B.
Follow-up
Answers
C.
Identification
C.
Identification
Answers
D.
Recovery
D.
Recovery
Answers
Suggested answer: C

When investigating a computer forensics case where Microsoft Exchange and Blackberry Enterprise server are used, where would investigator need to search to find email sent from a Blackberry device?

A.
RIM Messaging center
A.
RIM Messaging center
Answers
B.
Blackberry Enterprise server
B.
Blackberry Enterprise server
Answers
C.
Microsoft Exchange server
C.
Microsoft Exchange server
Answers
D.
Blackberry desktop redirector
D.
Blackberry desktop redirector
Answers
Suggested answer: C

What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?

A.
Fraggle
A.
Fraggle
Answers
B.
Smurf scan
B.
Smurf scan
Answers
C.
SYN flood
C.
SYN flood
Answers
D.
Teardrop
D.
Teardrop
Answers
Suggested answer: A

Which of the following is a list of recently used programs or opened files?

A.
Most Recently Used (MRU)
A.
Most Recently Used (MRU)
Answers
B.
Recently Used Programs (RUP)
B.
Recently Used Programs (RUP)
Answers
C.
Master File Table (MFT)
C.
Master File Table (MFT)
Answers
D.
GUID Partition Table (GPT)
D.
GUID Partition Table (GPT)
Answers
Suggested answer: A

Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?

A.
Data collection
A.
Data collection
Answers
B.
Secure the evidence
B.
Secure the evidence
Answers
C.
First response
C.
First response
Answers
D.
Data analysis
D.
Data analysis
Answers
Suggested answer: C

Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?

A.
Shortcut Files
A.
Shortcut Files
Answers
B.
Virtual files
B.
Virtual files
Answers
C.
Prefetch Files
C.
Prefetch Files
Answers
D.
Image Files
D.
Image Files
Answers
Suggested answer: A

Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?

A.
Dictionary attack
A.
Dictionary attack
Answers
B.
Brute force attack
B.
Brute force attack
Answers
C.
Rule-based attack
C.
Rule-based attack
Answers
D.
Man in the middle attack
D.
Man in the middle attack
Answers
Suggested answer: A

Which US law does the interstate or international transportation and receiving of child pornography fall under?

A.
§18. U.S.C. 1466A
A.
§18. U.S.C. 1466A
Answers
B.
§18. U.S.C 252
B.
§18. U.S.C 252
Answers
C.
§18. U.S.C 146A
C.
§18. U.S.C 146A
Answers
D.
§18. U.S.C 2252
D.
§18. U.S.C 2252
Answers
Suggested answer: D

Which network attack is described by the following statement?

"At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."

A.
DDoS
A.
DDoS
Answers
B.
Sniffer Attack
B.
Sniffer Attack
Answers
C.
Buffer Overflow
C.
Buffer Overflow
Answers
D.
Man-in-the-Middle Attack
D.
Man-in-the-Middle Attack
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71