ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 48

Question list
Search
Search

Related questions











Select the data that a virtual memory would store in a Windows-based system.

A.
Information or metadata of the files
A.
Information or metadata of the files
Answers
B.
Documents and other files
B.
Documents and other files
Answers
C.
Application data
C.
Application data
Answers
D.
Running processes
D.
Running processes
Answers
Suggested answer: D

Which of the following does not describe the type of data density on a hard disk?

A.
Volume density
A.
Volume density
Answers
B.
Track density
B.
Track density
Answers
C.
Linear or recording density
C.
Linear or recording density
Answers
D.
Areal density
D.
Areal density
Answers
Suggested answer: A

Amelia has got an email from a well-reputed company stating in the subject line that she has won a prize money, whereas the email body says that she has to pay a certain amount for being eligible for the contest. Which of the following acts does the email breach?

A.
CAN-SPAM Act
A.
CAN-SPAM Act
Answers
B.
HIPAA
B.
HIPAA
Answers
C.
GLBA
C.
GLBA
Answers
D.
SOX
D.
SOX
Answers
Suggested answer: A

Which principle states that "anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave"?

A.
Locard's Exchange Principle
A.
Locard's Exchange Principle
Answers
B.
Enterprise Theory of Investigation
B.
Enterprise Theory of Investigation
Answers
C.
Locard's Evidence Principle
C.
Locard's Evidence Principle
Answers
D.
Evidence Theory of Investigation
D.
Evidence Theory of Investigation
Answers
Suggested answer: A

During an investigation, Noel found the following SIM card from the suspect's mobile. What does the code 89 44 represent?

A.
Issuer Identifier Number and TAC
A.
Issuer Identifier Number and TAC
Answers
B.
Industry Identifier and Country code
B.
Industry Identifier and Country code
Answers
C.
Individual Account Identification Number and Country Code
C.
Individual Account Identification Number and Country Code
Answers
D.
TAC and Industry Identifier
D.
TAC and Industry Identifier
Answers
Suggested answer: B

Which of the following file system uses Master File Table (MFT) database to store information about every file and directory on a volume?

A.
FAT File System
A.
FAT File System
Answers
B.
ReFS
B.
ReFS
Answers
C.
exFAT
C.
exFAT
Answers
D.
NTFS File System
D.
NTFS File System
Answers
Suggested answer: D

As a part of the investigation, Caroline, a forensic expert, was assigned the task to examine the transaction logs pertaining to a database named Transfers. She used SQL Server Management Studio to collect the active transaction log files of the database. Caroline wants to extract detailed information on the logs, including AllocUnitId, page id, slot id, etc. Which of the following commands does she need to execute in order to extract the desired information?

A.
DBCC LOG(Transfers, 1)
A.
DBCC LOG(Transfers, 1)
Answers
B.
DBCC LOG(Transfers, 3)
B.
DBCC LOG(Transfers, 3)
Answers
C.
DBCC LOG(Transfers, 0)
C.
DBCC LOG(Transfers, 0)
Answers
D.
DBCC LOG(Transfers, 2)
D.
DBCC LOG(Transfers, 2)
Answers
Suggested answer: D

%3cscript%3ealert("XXXXXXXX")%3c/script%3e is a script obtained from a Cross-Site Scripting attack.

What type of encoding has the attacker employed?

A.
Double encoding
A.
Double encoding
Answers
B.
Hex encoding
B.
Hex encoding
Answers
C.
Unicode
C.
Unicode
Answers
D.
Base64
D.
Base64
Answers
Suggested answer: B

Which of the following is a device monitoring tool?

A.
Capsa
A.
Capsa
Answers
B.
Driver Detective
B.
Driver Detective
Answers
C.
Regshot
C.
Regshot
Answers
D.
RAM Capturer
D.
RAM Capturer
Answers
Suggested answer: A

What system details can an investigator obtain from the NetBIOS name table cache?

A.
List of files opened on other systems
A.
List of files opened on other systems
Answers
B.
List of the system present on a router
B.
List of the system present on a router
Answers
C.
List of connections made to other systems
C.
List of connections made to other systems
Answers
D.
List of files shared between the connected systems
D.
List of files shared between the connected systems
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71