ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 46

Question list
Search
Search

Related questions











An investigator has found certain details after analysis of a mobile device. What can reveal the manufacturer information?

A.
Equipment Identity Register (EIR)
A.
Equipment Identity Register (EIR)
Answers
B.
Electronic Serial Number (ESN)
B.
Electronic Serial Number (ESN)
Answers
C.
International mobile subscriber identity (IMSI)
C.
International mobile subscriber identity (IMSI)
Answers
D.
Integrated circuit card identifier (ICCID)
D.
Integrated circuit card identifier (ICCID)
Answers
Suggested answer: B

Which command line tool is used to determine active network connections?

A.
netsh
A.
netsh
Answers
B.
nbstat
B.
nbstat
Answers
C.
nslookup
C.
nslookup
Answers
D.
netstat
D.
netstat
Answers
Suggested answer: D

Which of the following processes is part of the dynamic malware analysis?

A.
Process Monitoring
A.
Process Monitoring
Answers
B.
Malware disassembly
B.
Malware disassembly
Answers
C.
Searching for the strings
C.
Searching for the strings
Answers
D.
File fingerprinting
D.
File fingerprinting
Answers
Suggested answer: A

Investigators can use the Type Allocation Code (TAC) to find the model and origin of a mobile device.

Where is TAC located in mobile devices?

A.
International Mobile Equipment Identifier (IMEI)
A.
International Mobile Equipment Identifier (IMEI)
Answers
B.
Integrated circuit card identifier (ICCID)
B.
Integrated circuit card identifier (ICCID)
Answers
C.
International mobile subscriber identity (IMSI)
C.
International mobile subscriber identity (IMSI)
Answers
D.
Equipment Identity Register (EIR)
D.
Equipment Identity Register (EIR)
Answers
Suggested answer: A

What do you call the process in which an attacker uses magnetic field over the digital media device to delete any previously stored data?

A.
Disk deletion
A.
Disk deletion
Answers
B.
Disk cleaning
B.
Disk cleaning
Answers
C.
Disk degaussing
C.
Disk degaussing
Answers
D.
Disk magnetization
D.
Disk magnetization
Answers
Suggested answer: C

Which of the following tool can reverse machine code to assembly language?

A.
PEiD
A.
PEiD
Answers
B.
RAM Capturer
B.
RAM Capturer
Answers
C.
IDA Pro
C.
IDA Pro
Answers
D.
Deep Log Analyzer
D.
Deep Log Analyzer
Answers
Suggested answer: C

Which of the following file formats allows the user to compress the acquired data as well as keep it randomly accessible?

A.
Proprietary Format
A.
Proprietary Format
Answers
B.
Generic Forensic Zip (gfzip)
B.
Generic Forensic Zip (gfzip)
Answers
C.
Advanced Forensic Framework 4
C.
Advanced Forensic Framework 4
Answers
D.
Advanced Forensics Format (AFF)
D.
Advanced Forensics Format (AFF)
Answers
Suggested answer: B

What is the investigator trying to view by issuing the command displayed in the following screenshot?

A.
List of services stopped
A.
List of services stopped
Answers
B.
List of services closed recently
B.
List of services closed recently
Answers
C.
List of services recently started
C.
List of services recently started
Answers
D.
List of services installed
D.
List of services installed
Answers
Suggested answer: D

Which layer of iOS architecture should a forensics investigator evaluate to analyze services such as Threading, File Access, Preferences, Networking and high-level features?

A.
Core Services
A.
Core Services
Answers
B.
Media services
B.
Media services
Answers
C.
Cocoa Touch
C.
Cocoa Touch
Answers
D.
Core OS
D.
Core OS
Answers
Suggested answer: D

Which command can provide the investigators with details of all the loaded modules on a Linuxbased system?

A.
list modules -a
A.
list modules -a
Answers
B.
lsmod
B.
lsmod
Answers
C.
plist mod -a
C.
plist mod -a
Answers
D.
lsof -m
D.
lsof -m
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71