ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Related questions











Andie, a network administrator, suspects unusual network services running on a windows system.

Which of the following commands should he use to verify unusual network services started on a Windows system?

A.
net serv
A.
net serv
Answers
B.
netmgr
B.
netmgr
Answers
C.
lusrmgr
C.
lusrmgr
Answers
D.
net start
D.
net start
Answers
Suggested answer: D

Randy has extracted data from an old version of a Windows-based system and discovered info file Dc5.txt in the system recycle bin. What does the file name denote?

A.
A text file deleted from C drive in sixth sequential order
A.
A text file deleted from C drive in sixth sequential order
Answers
B.
A text file deleted from C drive in fifth sequential order
B.
A text file deleted from C drive in fifth sequential order
Answers
C.
A text file copied from D drive to C drive in fifth sequential order
C.
A text file copied from D drive to C drive in fifth sequential order
Answers
D.
A text file copied from C drive to D drive in fifth sequential order
D.
A text file copied from C drive to D drive in fifth sequential order
Answers
Suggested answer: B

Sheila is a forensics trainee and is searching for hidden image files on a hard disk. She used a forensic investigation tool to view the media in hexadecimal code for simplifying the search process. Which of the following hex codes should she look for to identify image files?

A.
ff d8 ff
A.
ff d8 ff
Answers
B.
25 50 44 46
B.
25 50 44 46
Answers
C.
d0 0f 11 e0
C.
d0 0f 11 e0
Answers
D.
50 41 03 04
D.
50 41 03 04
Answers
Suggested answer: A

Shane, a forensic specialist, is investigating an ongoing attack on a MySQL database server hosted on a Windows machine with SID "WIN-ABCDE12345F." Which of the following log file will help Shane in tracking all the client connections and activities performed on the database server?

A.
WIN-ABCDE12345F.err
A.
WIN-ABCDE12345F.err
Answers
B.
WIN-ABCDE12345F-bin.n
B.
WIN-ABCDE12345F-bin.n
Answers
C.
WIN-ABCDE12345F.pid
C.
WIN-ABCDE12345F.pid
Answers
D.
WIN-ABCDE12345F.log
D.
WIN-ABCDE12345F.log
Answers
Suggested answer: D

What must an attorney do first before you are called to testify as an expert?

A.
Qualify you as an expert witness
A.
Qualify you as an expert witness
Answers
B.
Read your curriculum vitae to the jury
B.
Read your curriculum vitae to the jury
Answers
C.
Engage in damage control
C.
Engage in damage control
Answers
D.
Prove that the tools you used to conduct your examination are perfect
D.
Prove that the tools you used to conduct your examination are perfect
Answers
Suggested answer: A

Gary is checking for the devices connected to USB ports of a suspect system during an investigation.

Select the appropriate tool that will help him document all the connected devices.

A.
DevScan
A.
DevScan
Answers
B.
Devcon
B.
Devcon
Answers
C.
fsutil
C.
fsutil
Answers
D.
Reg.exe
D.
Reg.exe
Answers
Suggested answer: B

Which of the following is NOT a physical evidence?

A.
Removable media
A.
Removable media
Answers
B.
Cables
B.
Cables
Answers
C.
Image file on a hard disk
C.
Image file on a hard disk
Answers
D.
Publications
D.
Publications
Answers
Suggested answer: C

During forensics investigations, investigators tend to collect the system time at first and compare it with UTC. What does the abbreviation UTC stand for?

A.
Coordinated Universal Time
A.
Coordinated Universal Time
Answers
B.
Universal Computer Time
B.
Universal Computer Time
Answers
C.
Universal Time for Computers
C.
Universal Time for Computers
Answers
D.
Correlated Universal Time
D.
Correlated Universal Time
Answers
Suggested answer: A

Buffer overflow vulnerability of a web application occurs when it fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the_________. There are multiple forms of buffer overflow, including a Heap

Buffer Overflow and a Format String Attack.

A.
Adjacent memory locations
A.
Adjacent memory locations
Answers
B.
Adjacent bit blocks
B.
Adjacent bit blocks
Answers
C.
Adjacent buffer locations
C.
Adjacent buffer locations
Answers
D.
Adjacent string locations
D.
Adjacent string locations
Answers
Suggested answer: A

Which of the following is a part of a Solid-State Drive (SSD)?

A.
Head
A.
Head
Answers
B.
Cylinder
B.
Cylinder
Answers
C.
NAND-based flash memory
C.
NAND-based flash memory
Answers
D.
Spindle
D.
Spindle
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71