ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 39

List of questions

Question 381

Report Export Collapse

What is the primary function of the tool CHKDSK in Windows that authenticates the file system reliability of a volume?

Repairs logical file system errors
Repairs logical file system errors
Check the disk for hardware errors
Check the disk for hardware errors
Check the disk for connectivity errors
Check the disk for connectivity errors
Check the disk for Slack Space
Check the disk for Slack Space
Suggested answer: A
asked 18/09/2024
Seth Frizzell
43 questions

Question 382

Report Export Collapse

Which of the following tool enables data acquisition and duplication?

Colasoft's Capsa
Colasoft's Capsa
DriveSpy
DriveSpy
Wireshark
Wireshark
Xplico
Xplico
Suggested answer: B
asked 18/09/2024
ang kokwei
51 questions

Question 383

Report Export Collapse

What does 254 represent in ICCID 89254021520014515744?

Industry Identifier Prefix
Industry Identifier Prefix
Country Code
Country Code
Individual Account Identification Number
Individual Account Identification Number
Issuer Identifier Number
Issuer Identifier Number
Suggested answer: B
asked 18/09/2024
ali ghoubali
41 questions

Question 384

Report Export Collapse

Shane has started the static analysis of a malware and is using the tool ResourcesExtract to find more details of the malicious program. What part of the analysis is he performing?

Identifying File Dependencies
Identifying File Dependencies
Strings search
Strings search
Dynamic analysis
Dynamic analysis
File obfuscation
File obfuscation
Suggested answer: B
asked 18/09/2024
Liam Derwin
51 questions

Question 385

Report Export Collapse

A master boot record (MBR) is the first sector ("sector zero") of a data storage device. What is the size of MBR?

Depends on the capacity of the storage device
Depends on the capacity of the storage device
1048 Bytes
1048 Bytes
4092 Bytes
4092 Bytes
512 Bytes
512 Bytes
Suggested answer: D
asked 18/09/2024
Débora Gomes Almeida
49 questions

Question 386

Report Export Collapse

Which password cracking technique uses every possible combination of character sets?

Rainbow table attack
Rainbow table attack
Brute force attack
Brute force attack
Rule-based attack
Rule-based attack
Dictionary attack
Dictionary attack
Suggested answer: B
asked 18/09/2024
Gbena Wale
35 questions

Question 387

Report Export Collapse

Which of the following Event Correlation Approach is an advanced correlation method that assumes and predicts what an attacker can do next after the attack by studying the statistics and probability and uses only two variables?

Bayesian Correlation
Bayesian Correlation
Vulnerability-Based Approach
Vulnerability-Based Approach
Rule-Based Approach
Rule-Based Approach
Route Correlation
Route Correlation
Suggested answer: A
asked 18/09/2024
Tyler Andringa
41 questions

Question 388

Report Export Collapse

NTFS has reduced slack space than FAT, thus having lesser potential to hide data in the slack space.

This is because:

FAT does not index files
FAT does not index files
NTFS is a journaling file system
NTFS is a journaling file system
NTFS has lower cluster size space
NTFS has lower cluster size space
FAT is an older and inefficient file system
FAT is an older and inefficient file system
Suggested answer: C
asked 18/09/2024
Abheesh Vijayan
31 questions

Question 389

Report Export Collapse

Smith, as a part his forensic investigation assignment, seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data in the mobile device. Smith found that the SIM was protected by a Personal Identification Number (PIN) code, but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He made three unsuccessful attempts, which blocked the SIM card. What can Jason do in this scenario to reset the PIN and access SIM data?

He should contact the network operator for a Temporary Unlock Code (TUK)
He should contact the network operator for a Temporary Unlock Code (TUK)
Use system and hardware tools to gain access
Use system and hardware tools to gain access
He can attempt PIN guesses after 24 hours
He can attempt PIN guesses after 24 hours
He should contact the network operator for Personal Unlock Number (PUK)
He should contact the network operator for Personal Unlock Number (PUK)
Suggested answer: D
asked 18/09/2024
Heritier kandolo
50 questions

Question 390

Report Export Collapse

Which of the following data structures stores attributes of a process, as well as pointers to other attributes and data structures?

Lsproc
Lsproc
DumpChk
DumpChk
RegEdit
RegEdit
EProcess
EProcess
Suggested answer: D
asked 18/09/2024
AMMAR SHEIKH SALEH
39 questions
Total 704 questions
Go to page: of 71

Related questions