ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











E-mail logs contain which of the following information to help you in your investigation? (Choose four.)

A.
user account that was used to send the account
A.
user account that was used to send the account
Answers
B.
attachments sent with the e-mail message
B.
attachments sent with the e-mail message
Answers
C.
unique message identifier
C.
unique message identifier
Answers
D.
contents of the e-mail message
D.
contents of the e-mail message
Answers
E.
date and time the message was sent
E.
date and time the message was sent
Answers
Suggested answer: A, C, D, E

In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?

A.
one who has NTFS 4 or 5 partitions
A.
one who has NTFS 4 or 5 partitions
Answers
B.
one who uses dynamic swap file capability
B.
one who uses dynamic swap file capability
Answers
C.
one who uses hard disk writes on IRQ 13 and 21
C.
one who uses hard disk writes on IRQ 13 and 21
Answers
D.
one who has lots of allocation units per block or cluster
D.
one who has lots of allocation units per block or cluster
Answers
Suggested answer: D

In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

A.
evidence must be handled in the same way regardless of the type of case
A.
evidence must be handled in the same way regardless of the type of case
Answers
B.
evidence procedures are not important unless you work for a law enforcement agency
B.
evidence procedures are not important unless you work for a law enforcement agency
Answers
C.
evidence in a criminal case must be secured more tightly than in a civil case
C.
evidence in a criminal case must be secured more tightly than in a civil case
Answers
D.
evidence in a civil case must be secured more tightly than in a criminal case
D.
evidence in a civil case must be secured more tightly than in a criminal case
Answers
Suggested answer: C

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

A.
make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab
A.
make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab
Answers
B.
make an MD5 hash of the evidence and compare it to the standard database developed by NIST
B.
make an MD5 hash of the evidence and compare it to the standard database developed by NIST
Answers
C.
there is no reason to worry about this possible claim because state labs are certified
C.
there is no reason to worry about this possible claim because state labs are certified
Answers
D.
sign a statement attesting that the evidence is the same as it was when it entered the lab
D.
sign a statement attesting that the evidence is the same as it was when it entered the lab
Answers
Suggested answer: A

Study the log given below and answer the following question:

Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169

Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482

Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53

Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21

Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53

Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53

Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53

Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111

Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80

Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53

Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0)

Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506)

Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080

Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558

Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate?

A.
Disallow UDP53 in from outside to DNS server
A.
Disallow UDP53 in from outside to DNS server
Answers
B.
Allow UDP53 in from DNS server to outside
B.
Allow UDP53 in from DNS server to outside
Answers
C.
Disallow TCP53 in from secondaries or ISP server to DNS server
C.
Disallow TCP53 in from secondaries or ISP server to DNS server
Answers
D.
Block all UDP traffic
D.
Block all UDP traffic
Answers
Suggested answer: A

When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?

A.
Universal Time Set
A.
Universal Time Set
Answers
B.
Network Time Protocol
B.
Network Time Protocol
Answers
C.
SyncTime Service
C.
SyncTime Service
Answers
D.
Time-Sync Protocol
D.
Time-Sync Protocol
Answers
Suggested answer: B

When investigating a potential e-mail crime, what is your first step in the investigation?

A.
Trace the IP address to its origin
A.
Trace the IP address to its origin
Answers
B.
Write a report
B.
Write a report
Answers
C.
Determine whether a crime was actually committed
C.
Determine whether a crime was actually committed
Answers
D.
Recover the evidence
D.
Recover the evidence
Answers
Suggested answer: A

If a suspect computer is located in an area that may have toxic chemicals, you must:

A.
coordinate with the HAZMAT team
A.
coordinate with the HAZMAT team
Answers
B.
determine a way to obtain the suspect computer
B.
determine a way to obtain the suspect computer
Answers
C.
assume the suspect machine is contaminated
C.
assume the suspect machine is contaminated
Answers
D.
do not enter alone
D.
do not enter alone
Answers
Suggested answer: A

The following excerpt is taken from a honeypot log. The log captures activities across three days.

There are several intrusion attempts; however, a few are successful.

(Note: The objective of this question is to test whether the student can read basic information from log entries and interpret the nature of attack.)

Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169

Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482

Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53

Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21

Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53

Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53

Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53

Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111

Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80

Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53

Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0)

Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506)

Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080

Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558

From the options given below choose the one which best interprets the following entry:

Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

A.
An IDS evasion technique
A.
An IDS evasion technique
Answers
B.
A buffer overflow attempt
B.
A buffer overflow attempt
Answers
C.
A DNS zone transfer
C.
A DNS zone transfer
Answers
D.
Data being retrieved from 63.226.81.13
D.
Data being retrieved from 63.226.81.13
Answers
Suggested answer: A

What happens when a file is deleted by a Microsoft operating system using the FAT file system?

A.
only the reference to the file is removed from the FAT
A.
only the reference to the file is removed from the FAT
Answers
B.
the file is erased and cannot be recovered
B.
the file is erased and cannot be recovered
Answers
C.
a copy of the file is stored and the original file is erased
C.
a copy of the file is stored and the original file is erased
Answers
D.
the file is erased but can be recovered
D.
the file is erased but can be recovered
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71