ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











The surface of a hard disk consists of several concentric rings known as tracks; each of these tracks has smaller partitions called disk blocks. What is the size of each block?

A.
512 bits
A.
512 bits
Answers
B.
512 bytes
B.
512 bytes
Answers
C.
256 bits
C.
256 bits
Answers
D.
256 bytes
D.
256 bytes
Answers
Suggested answer: B

In Windows Security Event Log, what does an event id of 530 imply?

A.
Logon Failure - Unknown user name or bad password
A.
Logon Failure - Unknown user name or bad password
Answers
B.
Logon Failure - User not allowed to logon at this computer
B.
Logon Failure - User not allowed to logon at this computer
Answers
C.
Logon Failure - Account logon time restriction violation
C.
Logon Failure - Account logon time restriction violation
Answers
D.
Logon Failure - Account currently disabled
D.
Logon Failure - Account currently disabled
Answers
Suggested answer: C

Which of the following technique creates a replica of an evidence media?

A.
Data Extraction
A.
Data Extraction
Answers
B.
Backup
B.
Backup
Answers
C.
Bit Stream Imaging
C.
Bit Stream Imaging
Answers
D.
Data Deduplication
D.
Data Deduplication
Answers
Suggested answer: C

Which among the following search warrants allows the first responder to get the victim's computer information such as service records, billing records, and subscriber information from the service provider?

A.
Citizen Informant Search Warrant
A.
Citizen Informant Search Warrant
Answers
B.
Electronic Storage Device Search Warrant
B.
Electronic Storage Device Search Warrant
Answers
C.
John Doe Search Warrant
C.
John Doe Search Warrant
Answers
D.
Service Provider Search Warrant
D.
Service Provider Search Warrant
Answers
Suggested answer: B

Madison is on trial for allegedly breaking into her university's internal network. The police raided her dorm room and seized all of her computer equipment. Madison's lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison's lawyer trying to prove the police violated?

A.
The 4th Amendment
A.
The 4th Amendment
Answers
B.
The 1st Amendment
B.
The 1st Amendment
Answers
C.
The 10th Amendment
C.
The 10th Amendment
Answers
D.
The 5th Amendment
D.
The 5th Amendment
Answers
Suggested answer: A

Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?

A.
Portable Document Format
A.
Portable Document Format
Answers
B.
Advanced Forensics Format (AFF)
B.
Advanced Forensics Format (AFF)
Answers
C.
Proprietary Format
C.
Proprietary Format
Answers
D.
Raw Format
D.
Raw Format
Answers
Suggested answer: B

Depending upon the jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?

A.
18 USC §1029
A.
18 USC §1029
Answers
B.
18 USC §1030
B.
18 USC §1030
Answers
C.
18 USC §1361
C.
18 USC §1361
Answers
D.
18 USC §1371
D.
18 USC §1371
Answers
Suggested answer: B

Linux operating system has two types of typical bootloaders namely LILO (Linux Loader) and GRUB (Grand Unified Bootloader). In which stage of the booting process do the bootloaders become active?

A.
Bootloader Stage
A.
Bootloader Stage
Answers
B.
Kernel Stage
B.
Kernel Stage
Answers
C.
BootROM Stage
C.
BootROM Stage
Answers
D.
BIOS Stage
D.
BIOS Stage
Answers
Suggested answer: A

Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

A.
Rule-Based Approach
A.
Rule-Based Approach
Answers
B.
Automated Field Correlation
B.
Automated Field Correlation
Answers
C.
Field-Based Approach
C.
Field-Based Approach
Answers
D.
Graph-Based Approach
D.
Graph-Based Approach
Answers
Suggested answer: B

Which of the following tool creates a bit-by-bit image of an evidence media?

A.
Recuva
A.
Recuva
Answers
B.
FileMerlin
B.
FileMerlin
Answers
C.
AccessData FTK Imager
C.
AccessData FTK Imager
Answers
D.
Xplico
D.
Xplico
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71