ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 45

Question list
Search
Search

Related questions











What malware analysis operation can the investigator perform using the jv16 tool?

A.
Files and Folder Monitor
A.
Files and Folder Monitor
Answers
B.
Installation Monitor
B.
Installation Monitor
Answers
C.
Network Traffic Monitoring/Analysis
C.
Network Traffic Monitoring/Analysis
Answers
D.
Registry Analysis/Monitoring
D.
Registry Analysis/Monitoring
Answers
Suggested answer: D

Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)?

A.
Mime-Version header
A.
Mime-Version header
Answers
B.
Content-Type header
B.
Content-Type header
Answers
C.
Content-Transfer-Encoding header
C.
Content-Transfer-Encoding header
Answers
D.
Errors-To header
D.
Errors-To header
Answers
Suggested answer: D

Jacob is a computer forensics investigator with over 10 years of experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob's testimony in this case?

A.
Certification
A.
Certification
Answers
B.
Justification
B.
Justification
Answers
C.
Reiteration
C.
Reiteration
Answers
D.
Authentication
D.
Authentication
Answers
Suggested answer: D

When a user deletes a file, the system creates a $I file to store its details. What detail does the $I file not contain?

A.
File Size
A.
File Size
Answers
B.
File origin and modification
B.
File origin and modification
Answers
C.
Time and date of deletion
C.
Time and date of deletion
Answers
D.
File Name
D.
File Name
Answers
Suggested answer: B

Raw data acquisition format creates _________ of a data set or suspect drive.

A.
Segmented image files
A.
Segmented image files
Answers
B.
Simple sequential flat files
B.
Simple sequential flat files
Answers
C.
Compressed image files
C.
Compressed image files
Answers
D.
Segmented files
D.
Segmented files
Answers
Suggested answer: B

CAN-SPAM act requires that you:

A.
Don't use deceptive subject lines
A.
Don't use deceptive subject lines
Answers
B.
Don't tell the recipients where you are located
B.
Don't tell the recipients where you are located
Answers
C.
Don't identify the message as an ad
C.
Don't identify the message as an ad
Answers
D.
Don't use true header information
D.
Don't use true header information
Answers
Suggested answer: A

Which of the following registry hive gives the configuration information about which application was used to open various files on the system?

A.
HKEY_CLASSES_ROOT
A.
HKEY_CLASSES_ROOT
Answers
B.
HKEY_CURRENT_CONFIG
B.
HKEY_CURRENT_CONFIG
Answers
C.
HKEY_LOCAL_MACHINE
C.
HKEY_LOCAL_MACHINE
Answers
D.
HKEY_USERS
D.
HKEY_USERS
Answers
Suggested answer: A

Select the tool appropriate for examining the dynamically linked libraries of an application or malware.

A.
DependencyWalker
A.
DependencyWalker
Answers
B.
SysAnalyzer
B.
SysAnalyzer
Answers
C.
PEiD
C.
PEiD
Answers
D.
ResourcesExtract
D.
ResourcesExtract
Answers
Suggested answer: A

Which among the following U.S. laws requires financial institutions-companies that offer consumers financial products or services such as loans, financial or investment advice, or insurance- to protect their customers' information against security threats?

A.
SOX
A.
SOX
Answers
B.
HIPAA
B.
HIPAA
Answers
C.
GLBA
C.
GLBA
Answers
D.
FISMA
D.
FISMA
Answers
Suggested answer: C

Which of the following application password cracking tool can discover all password-protected items on a computer and decrypts them?

A.
TestDisk for Windows
A.
TestDisk for Windows
Answers
B.
R-Studio
B.
R-Studio
Answers
C.
Windows Password Recovery Bootdisk
C.
Windows Password Recovery Bootdisk
Answers
D.
Passware Kit Forensic
D.
Passware Kit Forensic
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71