ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 42

Add to Whishlist

List of questions

Question 411

Report Export Collapse

Andie, a network administrator, suspects unusual network services running on a windows system.

Which of the following commands should he use to verify unusual network services started on a Windows system?

Become a Premium Member for full access
  Unlock Premium Member

Question 412

Report Export Collapse

Randy has extracted data from an old version of a Windows-based system and discovered info file Dc5.txt in the system recycle bin. What does the file name denote?

Become a Premium Member for full access
  Unlock Premium Member

Question 413

Report Export Collapse

Sheila is a forensics trainee and is searching for hidden image files on a hard disk. She used a forensic investigation tool to view the media in hexadecimal code for simplifying the search process. Which of the following hex codes should she look for to identify image files?

Become a Premium Member for full access
  Unlock Premium Member

Question 414

Report Export Collapse

Shane, a forensic specialist, is investigating an ongoing attack on a MySQL database server hosted on a Windows machine with SID "WIN-ABCDE12345F." Which of the following log file will help Shane in tracking all the client connections and activities performed on the database server?

Become a Premium Member for full access
  Unlock Premium Member

Question 415

Report Export Collapse

What must an attorney do first before you are called to testify as an expert?

Become a Premium Member for full access
  Unlock Premium Member

Question 416

Report Export Collapse

Gary is checking for the devices connected to USB ports of a suspect system during an investigation.

Select the appropriate tool that will help him document all the connected devices.

Become a Premium Member for full access
  Unlock Premium Member

Question 417

Report Export Collapse

Which of the following is NOT a physical evidence?

Become a Premium Member for full access
  Unlock Premium Member

Question 418

Report Export Collapse

During forensics investigations, investigators tend to collect the system time at first and compare it with UTC. What does the abbreviation UTC stand for?

Become a Premium Member for full access
  Unlock Premium Member

Question 419

Report Export Collapse

Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the_________. There are multiple forms of buffer overflow, including a Heap

Buffer Overflow and a Format String Attack.

Become a Premium Member for full access
  Unlock Premium Member

Question 420

Report Export Collapse

Which of the following is a part of a Solid-State Drive (SSD)?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions