ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 43

Question list
Search
Search

List of questions

Search

Related questions











Which of the following standard represents a legal precedent set in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses' testimony during federal legal proceedings?

A.
SWGDE & SWGIT
A.
SWGDE & SWGIT
Answers
B.
IOCE
B.
IOCE
Answers
C.
Frye
C.
Frye
Answers
D.
Daubert
D.
Daubert
Answers
Suggested answer: D

Which of the following statements is incorrect when preserving digital evidence?

A.
Verify if the monitor is in on, off, or in sleep mode
A.
Verify if the monitor is in on, off, or in sleep mode
Answers
B.
Turn on the computer and extract Windows event viewer log files
B.
Turn on the computer and extract Windows event viewer log files
Answers
C.
Remove the plug from the power router or modem
C.
Remove the plug from the power router or modem
Answers
D.
Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals
D.
Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals
Answers
Suggested answer: B

Which of the following ISO standard defines file systems and protocol for exchanging data between optical disks?

A.
ISO 9660
A.
ISO 9660
Answers
B.
ISO/IEC 13940
B.
ISO/IEC 13940
Answers
C.
ISO 9060
C.
ISO 9060
Answers
D.
IEC 3490
D.
IEC 3490
Answers
Suggested answer: A

Lynne receives the following email:

Dear [email protected]! We are sorry to inform you that your ID has been temporarily frozen due to incorrect or missing information saved at 2016/11/10 20:40:24 You have 24 hours to fix this problem or risk to be closed permanently! To proceed Please Connect >> My Apple ID Thank You The link to My Apple ID shows http://byggarbetsplatsen.se/backup/signon/ What type of attack is this?

A.
Mail Bombing
A.
Mail Bombing
Answers
B.
Phishing
B.
Phishing
Answers
C.
Email Spamming
C.
Email Spamming
Answers
D.
Email Spoofing
D.
Email Spoofing
Answers
Suggested answer: B

What value of the "Boot Record Signature" is used to indicate that the boot-loader exists?

A.
AA55
A.
AA55
Answers
B.
00AA
B.
00AA
Answers
C.
AA00
C.
AA00
Answers
D.
A100
D.
A100
Answers
Suggested answer: A

Which of the following is a MAC-based File Recovery Tool?

A.
VirtualLab
A.
VirtualLab
Answers
B.
GetDataBack
B.
GetDataBack
Answers
C.
Cisdem DataRecovery 3
C.
Cisdem DataRecovery 3
Answers
D.
Smart Undeleter
D.
Smart Undeleter
Answers
Suggested answer: C

Smith, an employee of a reputed forensic investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in the hacking of the organization's DC server.

Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry keys will Smith check to find the above information?

A.
TypedURLs key
A.
TypedURLs key
Answers
B.
MountedDevices key
B.
MountedDevices key
Answers
C.
UserAssist Key
C.
UserAssist Key
Answers
D.
RunMRU key
D.
RunMRU key
Answers
Suggested answer: D

When analyzing logs, it is important that the clocks of all the network devices are synchronized.

Which protocol will help in synchronizing these clocks?

A.
UTC
A.
UTC
Answers
B.
PTP
B.
PTP
Answers
C.
Time Protocol
C.
Time Protocol
Answers
D.
NTP
D.
NTP
Answers
Suggested answer: D

An International Mobile Equipment Identifier (IMEI) is a 15-digit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is also known as:

A.
Type Allocation Code (TAC)
A.
Type Allocation Code (TAC)
Answers
B.
Integrated Circuit Code (ICC)
B.
Integrated Circuit Code (ICC)
Answers
C.
Manufacturer Identification Code (MIC)
C.
Manufacturer Identification Code (MIC)
Answers
D.
Device Origin Code (DOC)
D.
Device Origin Code (DOC)
Answers
Suggested answer: A

Which of the following is NOT an anti-forensics technique?

A.
Data Deduplication
A.
Data Deduplication
Answers
B.
Steganography
B.
Steganography
Answers
C.
Encryption
C.
Encryption
Answers
D.
Password Protection
D.
Password Protection
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71