ECCouncil 312-49v10 Practice Test - Questions Answers, Page 48
List of questions
Related questions
Select the data that a virtual memory would store in a Windows-based system.
Which of the following does not describe the type of data density on a hard disk?
Amelia has got an email from a well-reputed company stating in the subject line that she has won a prize money, whereas the email body says that she has to pay a certain amount for being eligible for the contest. Which of the following acts does the email breach?
Which principle states that "anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave"?
During an investigation, Noel found the following SIM card from the suspect's mobile. What does the code 89 44 represent?
Which of the following file system uses Master File Table (MFT) database to store information about every file and directory on a volume?
As a part of the investigation, Caroline, a forensic expert, was assigned the task to examine the transaction logs pertaining to a database named Transfers. She used SQL Server Management Studio to collect the active transaction log files of the database. Caroline wants to extract detailed information on the logs, including AllocUnitId, page id, slot id, etc. Which of the following commands does she need to execute in order to extract the desired information?
%3cscript%3ealert("XXXXXXXX")%3c/script%3e is a script obtained from a Cross-Site Scripting attack.
What type of encoding has the attacker employed?
Which of the following is a device monitoring tool?
What system details can an investigator obtain from the NetBIOS name table cache?
Question