ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 40

Question list
Search
Search

List of questions

Search

Related questions











How will you categorize a cybercrime that took place within a CSP's cloud environment?

A.
Cloud as a Subject
A.
Cloud as a Subject
Answers
B.
Cloud as a Tool
B.
Cloud as a Tool
Answers
C.
Cloud as an Audit
C.
Cloud as an Audit
Answers
D.
Cloud as an Object
D.
Cloud as an Object
Answers
Suggested answer: D

Which of the following reports are delivered under oath to a board of directors/managers/panel of the jury?

A.
Written Formal Report
A.
Written Formal Report
Answers
B.
Verbal Formal Report
B.
Verbal Formal Report
Answers
C.
Verbal Informal Report
C.
Verbal Informal Report
Answers
D.
Written Informal Report
D.
Written Informal Report
Answers
Suggested answer: B

The process of restarting a computer that is already turned on through the operating system is called?

A.
Warm boot
A.
Warm boot
Answers
B.
Ice boot
B.
Ice boot
Answers
C.
Hot Boot
C.
Hot Boot
Answers
D.
Cold boot
D.
Cold boot
Answers
Suggested answer: A

Amber, a black hat hacker, has embedded a malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?

A.
Click-jacking
A.
Click-jacking
Answers
B.
Compromising a legitimate site
B.
Compromising a legitimate site
Answers
C.
Spearphishing
C.
Spearphishing
Answers
D.
Malvertising
D.
Malvertising
Answers
Suggested answer: D

Sectors are pie-shaped regions on a hard disk that store dat a. Which of the following parts of a hard disk do not contribute in determining the addresses of data?

A.
Sectors
A.
Sectors
Answers
B.
Interface
B.
Interface
Answers
C.
Cylinder
C.
Cylinder
Answers
D.
Heads
D.
Heads
Answers
Suggested answer: B

Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

A.
netstat - r
A.
netstat - r
Answers
B.
netstat - ano
B.
netstat - ano
Answers
C.
netstat - b
C.
netstat - b
Answers
D.
netstat - s
D.
netstat - s
Answers
Suggested answer: B

Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?

A.
Microsoft Outlook
A.
Microsoft Outlook
Answers
B.
Eudora
B.
Eudora
Answers
C.
Mozilla Thunderbird
C.
Mozilla Thunderbird
Answers
D.
Microsoft Outlook Express
D.
Microsoft Outlook Express
Answers
Suggested answer: D

Which network attack is described by the following statement? "At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."

A.
Man-in-the-Middle Attack
A.
Man-in-the-Middle Attack
Answers
B.
Sniffer Attack
B.
Sniffer Attack
Answers
C.
Buffer Overflow
C.
Buffer Overflow
Answers
D.
DDoS
D.
DDoS
Answers
Suggested answer: D

Which of the following is NOT a part of pre-investigation phase?

A.
Building forensics workstation
A.
Building forensics workstation
Answers
B.
Gathering information about the incident
B.
Gathering information about the incident
Answers
C.
Gathering evidence data
C.
Gathering evidence data
Answers
D.
Creating an investigation team
D.
Creating an investigation team
Answers
Suggested answer: C

To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?

A.
Post-investigation Phase
A.
Post-investigation Phase
Answers
B.
Reporting Phase
B.
Reporting Phase
Answers
C.
Pre-investigation Phase
C.
Pre-investigation Phase
Answers
D.
Investigation Phase
D.
Investigation Phase
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71