ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 39

Question list
Search
Search

Related questions











What is the primary function of the tool CHKDSK in Windows that authenticates the file system reliability of a volume?

A.
Repairs logical file system errors
A.
Repairs logical file system errors
Answers
B.
Check the disk for hardware errors
B.
Check the disk for hardware errors
Answers
C.
Check the disk for connectivity errors
C.
Check the disk for connectivity errors
Answers
D.
Check the disk for Slack Space
D.
Check the disk for Slack Space
Answers
Suggested answer: A

Which of the following tool enables data acquisition and duplication?

A.
Colasoft's Capsa
A.
Colasoft's Capsa
Answers
B.
DriveSpy
B.
DriveSpy
Answers
C.
Wireshark
C.
Wireshark
Answers
D.
Xplico
D.
Xplico
Answers
Suggested answer: B

What does 254 represent in ICCID 89254021520014515744?

A.
Industry Identifier Prefix
A.
Industry Identifier Prefix
Answers
B.
Country Code
B.
Country Code
Answers
C.
Individual Account Identification Number
C.
Individual Account Identification Number
Answers
D.
Issuer Identifier Number
D.
Issuer Identifier Number
Answers
Suggested answer: B

Shane has started the static analysis of a malware and is using the tool ResourcesExtract to find more details of the malicious program. What part of the analysis is he performing?

A.
Identifying File Dependencies
A.
Identifying File Dependencies
Answers
B.
Strings search
B.
Strings search
Answers
C.
Dynamic analysis
C.
Dynamic analysis
Answers
D.
File obfuscation
D.
File obfuscation
Answers
Suggested answer: B

A master boot record (MBR) is the first sector ("sector zero") of a data storage device. What is the size of MBR?

A.
Depends on the capacity of the storage device
A.
Depends on the capacity of the storage device
Answers
B.
1048 Bytes
B.
1048 Bytes
Answers
C.
4092 Bytes
C.
4092 Bytes
Answers
D.
512 Bytes
D.
512 Bytes
Answers
Suggested answer: D

Which password cracking technique uses every possible combination of character sets?

A.
Rainbow table attack
A.
Rainbow table attack
Answers
B.
Brute force attack
B.
Brute force attack
Answers
C.
Rule-based attack
C.
Rule-based attack
Answers
D.
Dictionary attack
D.
Dictionary attack
Answers
Suggested answer: B

Which of the following Event Correlation Approach is an advanced correlation method that assumes and predicts what an attacker can do next after the attack by studying the statistics and probability and uses only two variables?

A.
Bayesian Correlation
A.
Bayesian Correlation
Answers
B.
Vulnerability-Based Approach
B.
Vulnerability-Based Approach
Answers
C.
Rule-Based Approach
C.
Rule-Based Approach
Answers
D.
Route Correlation
D.
Route Correlation
Answers
Suggested answer: A

NTFS has reduced slack space than FAT, thus having lesser potential to hide data in the slack space.

This is because:

A.
FAT does not index files
A.
FAT does not index files
Answers
B.
NTFS is a journaling file system
B.
NTFS is a journaling file system
Answers
C.
NTFS has lower cluster size space
C.
NTFS has lower cluster size space
Answers
D.
FAT is an older and inefficient file system
D.
FAT is an older and inefficient file system
Answers
Suggested answer: C

Smith, as a part his forensic investigation assignment, seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data in the mobile device. Smith found that the SIM was protected by a Personal Identification Number (PIN) code, but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He made three unsuccessful attempts, which blocked the SIM card. What can Jason do in this scenario to reset the PIN and access SIM data?

A.
He should contact the network operator for a Temporary Unlock Code (TUK)
A.
He should contact the network operator for a Temporary Unlock Code (TUK)
Answers
B.
Use system and hardware tools to gain access
B.
Use system and hardware tools to gain access
Answers
C.
He can attempt PIN guesses after 24 hours
C.
He can attempt PIN guesses after 24 hours
Answers
D.
He should contact the network operator for Personal Unlock Number (PUK)
D.
He should contact the network operator for Personal Unlock Number (PUK)
Answers
Suggested answer: D

Which of the following data structures stores attributes of a process, as well as pointers to other attributes and data structures?

A.
Lsproc
A.
Lsproc
Answers
B.
DumpChk
B.
DumpChk
Answers
C.
RegEdit
C.
RegEdit
Answers
D.
EProcess
D.
EProcess
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71