ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is a database in which information about every file and directory on an NT File System (NTFS) volume is stored?

A.
Volume Boot Record
A.
Volume Boot Record
Answers
B.
Master Boot Record
B.
Master Boot Record
Answers
C.
GUID Partition Table
C.
GUID Partition Table
Answers
D.
Master File Table
D.
Master File Table
Answers
Suggested answer: D

Adam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution.

Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?

A.
PRIV.STM
A.
PRIV.STM
Answers
B.
gwcheck.db
B.
gwcheck.db
Answers
C.
PRIV.EDB
C.
PRIV.EDB
Answers
D.
PUB.EDB
D.
PUB.EDB
Answers
Suggested answer: A

Stephen is checking an image using Compare Files by The Wizard, and he sees the file signature is shown as FF D8 FF E1. What is the file type of the image?

A.
gif
A.
gif
Answers
B.
bmp
B.
bmp
Answers
C.
jpeg
C.
jpeg
Answers
D.
png
D.
png
Answers
Suggested answer: C

Which of the following tools will help the investigator to analyze web server logs?

A.
XRY LOGICAL
A.
XRY LOGICAL
Answers
B.
LanWhois
B.
LanWhois
Answers
C.
Deep Log Monitor
C.
Deep Log Monitor
Answers
D.
Deep Log Analyzer
D.
Deep Log Analyzer
Answers
Suggested answer: D

Which of the following files gives information about the client sync sessions in Google Drive on Windows?

A.
sync_log.log
A.
sync_log.log
Answers
B.
Sync_log.log
B.
Sync_log.log
Answers
C.
sync.log
C.
sync.log
Answers
D.
Sync.log
D.
Sync.log
Answers
Suggested answer: B

Which among the following is an act passed by the U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations?

A.
HIPAA
A.
HIPAA
Answers
B.
GLBA
B.
GLBA
Answers
C.
SOX
C.
SOX
Answers
D.
FISMA
D.
FISMA
Answers
Suggested answer: C

Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?

A.
Events history
A.
Events history
Answers
B.
Previously typed commands
B.
Previously typed commands
Answers
C.
History of the browser
C.
History of the browser
Answers
D.
Passwords used across the system
D.
Passwords used across the system
Answers
Suggested answer: B

Jacky encrypts her documents using a password. It is known that she uses her daughter's year of birth as part of the password. Which password cracking technique would be optimal to crack her password?

A.
Rule-based attack
A.
Rule-based attack
Answers
B.
Brute force attack
B.
Brute force attack
Answers
C.
Syllable attack
C.
Syllable attack
Answers
D.
Hybrid attack
D.
Hybrid attack
Answers
Suggested answer: A

Which of the following tool can the investigator use to analyze the network to detect Trojan activities?

A.
Regshot
A.
Regshot
Answers
B.
TRIPWIRE
B.
TRIPWIRE
Answers
C.
RAM Computer
C.
RAM Computer
Answers
D.
Capsa
D.
Capsa
Answers
Suggested answer: D

When a user deletes a file or folder, the system stores complete path including the original filename is a special hidden file called "INFO2" in the Recycled folder. If the INFO2 file is deleted, it is recovered when you ______________________.

A.
Undo the last action performed on the system
A.
Undo the last action performed on the system
Answers
B.
Reboot Windows
B.
Reboot Windows
Answers
C.
Use a recovery tool to undelete the file
C.
Use a recovery tool to undelete the file
Answers
D.
Download the file from Microsoft website
D.
Download the file from Microsoft website
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71