ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











Which among the following files provides email header information in the Microsoft Exchange server?

A.
gwcheck.db
A.
gwcheck.db
Answers
B.
PRIV.EDB
B.
PRIV.EDB
Answers
C.
PUB.EDB
C.
PUB.EDB
Answers
D.
PRIV.STM
D.
PRIV.STM
Answers
Suggested answer: B

Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server's root directory?

A.
Parameter/form tampering
A.
Parameter/form tampering
Answers
B.
Unvalidated input
B.
Unvalidated input
Answers
C.
Directory traversal
C.
Directory traversal
Answers
D.
Security misconfiguration
D.
Security misconfiguration
Answers
Suggested answer: C

What is the size value of a nibble?

A.
0.5 kilo byte
A.
0.5 kilo byte
Answers
B.
0.5 bit
B.
0.5 bit
Answers
C.
0.5 byte
C.
0.5 byte
Answers
D.
2 bits
D.
2 bits
Answers
Suggested answer: C

Which of the following tool enables a user to reset his/her lost admin password in a Windows system?

A.
Advanced Office Password Recovery
A.
Advanced Office Password Recovery
Answers
B.
Active@ Password Changer
B.
Active@ Password Changer
Answers
C.
Smartkey Password Recovery Bundle Standard
C.
Smartkey Password Recovery Bundle Standard
Answers
D.
Passware Kit Forensic
D.
Passware Kit Forensic
Answers
Suggested answer: B

Which of the following acts as a network intrusion detection system as well as network intrusion prevention system?

A.
Accunetix
A.
Accunetix
Answers
B.
Nikto
B.
Nikto
Answers
C.
Snort
C.
Snort
Answers
D.
Kismet
D.
Kismet
Answers
Suggested answer: C

In Steganalysis, which of the following describes a Known-stego attack?

A.
The hidden message and the corresponding stego-image are known
A.
The hidden message and the corresponding stego-image are known
Answers
B.
During the communication process, active attackers can change cover
B.
During the communication process, active attackers can change cover
Answers
C.
Original and stego-object are available and the steganography algorithm is known
C.
Original and stego-object are available and the steganography algorithm is known
Answers
D.
Only the steganography medium is available for analysis
D.
Only the steganography medium is available for analysis
Answers
Suggested answer: C

Annie is searching for certain deleted files on a system running Windows XP OS. Where will she find the files if they were not completely deleted from the system?

A.
C: $Recycled.Bin
A.
C: $Recycled.Bin
Answers
B.
C: \$Recycle.Bin
B.
C: \$Recycle.Bin
Answers
C.
C:\RECYCLER
C.
C:\RECYCLER
Answers
D.
C:\$RECYCLER
D.
C:\$RECYCLER
Answers
Suggested answer: B

Which of the following files stores information about a local Google Drive installation such as User email ID, Local Sync Root Path, and Client version installed?

A.
filecache.db
A.
filecache.db
Answers
B.
config.db
B.
config.db
Answers
C.
sigstore.db
C.
sigstore.db
Answers
D.
Sync_config.db
D.
Sync_config.db
Answers
Suggested answer: D

An expert witness is a __________________ who is normally appointed by a party to assist the formulation and preparation of a party's claim or defense.

A.
Expert in criminal investigation
A.
Expert in criminal investigation
Answers
B.
Subject matter specialist
B.
Subject matter specialist
Answers
C.
Witness present at the crime scene
C.
Witness present at the crime scene
Answers
D.
Expert law graduate appointed by attorney
D.
Expert law graduate appointed by attorney
Answers
Suggested answer: B

Smith, a network administrator with a large MNC, was the first to arrive at a suspected crime scene involving criminal use of compromised computers. What should be his first response while maintaining the integrity of evidence?

A.
Record the system state by taking photographs of physical system and the display
A.
Record the system state by taking photographs of physical system and the display
Answers
B.
Perform data acquisition without disturbing the state of the systems
B.
Perform data acquisition without disturbing the state of the systems
Answers
C.
Open the systems, remove the hard disk and secure it
C.
Open the systems, remove the hard disk and secure it
Answers
D.
Switch off the systems and carry them to the laboratory
D.
Switch off the systems and carry them to the laboratory
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71