ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 45

Add to Whishlist

List of questions

Question 441

Report Export Collapse

What malware analysis operation can the investigator perform using the jv16 tool?

Become a Premium Member for full access
  Unlock Premium Member

Question 442

Report Export Collapse

Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)?

Become a Premium Member for full access
  Unlock Premium Member

Question 443

Report Export Collapse

Jacob is a computer forensics investigator with over 10 years of experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob's testimony in this case?

Become a Premium Member for full access
  Unlock Premium Member

Question 444

Report Export Collapse

When a user deletes a file, the system creates a $I file to store its details. What detail does the $I file not contain?

Become a Premium Member for full access
  Unlock Premium Member

Question 445

Report Export Collapse

Raw data acquisition format creates _________ of a data set or suspect drive.

Become a Premium Member for full access
  Unlock Premium Member

Question 446

Report Export Collapse

CAN-SPAM act requires that you:

Become a Premium Member for full access
  Unlock Premium Member

Question 447

Report Export Collapse

Which of the following registry hive gives the configuration information about which application was used to open various files on the system?

Become a Premium Member for full access
  Unlock Premium Member

Question 448

Report Export Collapse

Select the tool appropriate for examining the dynamically linked libraries of an application or malware.

Become a Premium Member for full access
  Unlock Premium Member

Question 449

Report Export Collapse

Which among the following U.S. laws requires financial institutions-companies that offer consumers financial products or services such as loans, financial or investment advice, or insurance- to protect their customers' information against security threats?

Become a Premium Member for full access
  Unlock Premium Member

Question 450

Report Export Collapse

Which of the following application password cracking tool can discover all password-protected items on a computer and decrypts them?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71

Related questions