ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 40

Add to Whishlist

List of questions

Question 391

Report Export Collapse

How will you categorize a cybercrime that took place within a CSP's cloud environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 392

Report Export Collapse

Which of the following reports are delivered under oath to a board of directors/managers/panel of the jury?

Become a Premium Member for full access
  Unlock Premium Member

Question 393

Report Export Collapse

The process of restarting a computer that is already turned on through the operating system is called?

Become a Premium Member for full access
  Unlock Premium Member

Question 394

Report Export Collapse

Amber, a black hat hacker, has embedded a malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?

Become a Premium Member for full access
  Unlock Premium Member

Question 395

Report Export Collapse

Sectors are pie-shaped regions on a hard disk that store dat a. Which of the following parts of a hard disk do not contribute in determining the addresses of data?

Become a Premium Member for full access
  Unlock Premium Member

Question 396

Report Export Collapse

Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics. Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

Become a Premium Member for full access
  Unlock Premium Member

Question 397

Report Export Collapse

Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?

Become a Premium Member for full access
  Unlock Premium Member

Question 398

Report Export Collapse

Which network attack is described by the following statement? "At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."

Become a Premium Member for full access
  Unlock Premium Member

Question 399

Report Export Collapse

Which of the following is NOT a part of pre-investigation phase?

Become a Premium Member for full access
  Unlock Premium Member

Question 400

Report Export Collapse

To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions