ECCouncil 312-49v10 Practice Test - Questions Answers, Page 36

List of questions
Question 351

The investigator wants to examine changes made to the system's registry by the suspect program.
Which of the following tool can help the investigator?
Question 352

What does the part of the log, "% SEC-6-IPACCESSLOGP", extracted from a Cisco router represent?
Question 353

Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where "x" represents the ___________________.
Question 354

Which of the following is an iOS Jailbreaking tool?
Question 355

Which of the following Registry components include offsets to other cells as well as the LastWrite time for the key?
Question 356

What is the default IIS log location?
Question 357

Charles has accidentally deleted an important file while working on his Mac computer. He wants to recover the deleted file as it contains some of his crucial business secrets. Which of the following tool will help Charles?
Question 358

Which file is a sequence of bytes organized into blocks understandable by the system's linker?
Question 359

Smith, a forensic examiner, was analyzing a hard disk image to find and acquire deleted sensitive files. He stumbled upon a $Recycle.Bin folder in the root directory of the disk. Identify the operating system in use.
Question 360

Jason discovered a file named $RIYG6VR.doc in the C:\$Recycle.Bin\\ while analyzing a hard disk image for the deleted dat a. What inferences can he make from the file name?
Question