ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











Which of the following tool captures and allows you to interactively browse the traffic on a network?

A.
Security Task Manager
A.
Security Task Manager
Answers
B.
Wireshark
B.
Wireshark
Answers
C.
ThumbsDisplay
C.
ThumbsDisplay
Answers
D.
RegScanner
D.
RegScanner
Answers
Suggested answer: B

Which of the following standard represents a legal precedent sent in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses' testimony during federal legal proceedings?

A.
IOCE
A.
IOCE
Answers
B.
SWGDE & SWGIT
B.
SWGDE & SWGIT
Answers
C.
Frye
C.
Frye
Answers
D.
Daubert
D.
Daubert
Answers
Suggested answer: D

Which of the following stages in a Linux boot process involve initialization of the system's hardware?

A.
BIOS Stage
A.
BIOS Stage
Answers
B.
Bootloader Stage
B.
Bootloader Stage
Answers
C.
BootROM Stage
C.
BootROM Stage
Answers
D.
Kernel Stage
D.
Kernel Stage
Answers
Suggested answer: A

Who is responsible for the following tasks?

A.
Non-forensics staff
A.
Non-forensics staff
Answers
B.
Lawyers
B.
Lawyers
Answers
C.
System administrators
C.
System administrators
Answers
D.
Local managers or other non-forensic staff
D.
Local managers or other non-forensic staff
Answers
Suggested answer: A

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?

A.
Ad hoc associations
A.
Ad hoc associations
Answers
B.
Client mis-association
B.
Client mis-association
Answers
C.
MAC spoofing
C.
MAC spoofing
Answers
D.
Rogue access points
D.
Rogue access points
Answers
Suggested answer: B

You have been given the task to investigate web attacks on a Windows-based server. Which of the following commands will you use to look at the sessions the machine has opened with other systems?

A.
Net sessions
A.
Net sessions
Answers
B.
Net config
B.
Net config
Answers
C.
Net share
C.
Net share
Answers
D.
Net use
D.
Net use
Answers
Suggested answer: D

Watson, a forensic investigator, is examining a copy of an ISO file stored in CDFS format. What type of evidence is this?

A.
Data from a CD copied using Windows
A.
Data from a CD copied using Windows
Answers
B.
Data from a CD copied using Mac-based system
B.
Data from a CD copied using Mac-based system
Answers
C.
Data from a DVD copied using Windows system
C.
Data from a DVD copied using Windows system
Answers
D.
Data from a CD copied using Linux system
D.
Data from a CD copied using Linux system
Answers
Suggested answer: A

Which of the following techniques can be used to beat steganography?

A.
Encryption
A.
Encryption
Answers
B.
Steganalysis
B.
Steganalysis
Answers
C.
Decryption
C.
Decryption
Answers
D.
Cryptanalysis
D.
Cryptanalysis
Answers
Suggested answer: B

Which of the following options will help users to enable or disable the last access time on a system running Windows 10 OS?

A.
wmic service
A.
wmic service
Answers
B.
Reg.exe
B.
Reg.exe
Answers
C.
fsutil
C.
fsutil
Answers
D.
Devcon
D.
Devcon
Answers
Suggested answer: C

Bob has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drives. he wants to recover all those data, which includes his personal photos, music, documents, videos, official email, etc. Which of the following tools shall resolve Bob's purpose?

A.
Colasoft's Capsa
A.
Colasoft's Capsa
Answers
B.
Recuva
B.
Recuva
Answers
C.
Cain & Abel
C.
Cain & Abel
Answers
D.
Xplico
D.
Xplico
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71