ECCouncil 312-49v10 Practice Test - Questions Answers, Page 36
List of questions
Question 351
The investigator wants to examine changes made to the system's registry by the suspect program.
Which of the following tool can help the investigator?
Question 352
What does the part of the log, "% SEC-6-IPACCESSLOGP", extracted from a Cisco router represent?
Question 353
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where "x" represents the ___________________.
Question 354
Which of the following is an iOS Jailbreaking tool?
Question 355
Which of the following Registry components include offsets to other cells as well as the LastWrite time for the key?
Question 356
What is the default IIS log location?
Question 357
Charles has accidentally deleted an important file while working on his Mac computer. He wants to recover the deleted file as it contains some of his crucial business secrets. Which of the following tool will help Charles?
Question 358
Which file is a sequence of bytes organized into blocks understandable by the system's linker?
Question 359
Smith, a forensic examiner, was analyzing a hard disk image to find and acquire deleted sensitive files. He stumbled upon a $Recycle.Bin folder in the root directory of the disk. Identify the operating system in use.
Question 360
Jason discovered a file named $RIYG6VR.doc in the C:\$Recycle.Bin\\ while analyzing a hard disk image for the deleted dat a. What inferences can he make from the file name?
Question