ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 49

List of questions

Question 481

Report Export Collapse

While analyzing a hard disk, the investigator finds that the file system does not use UEFI-based interface. Which of the following operating systems is present on the hard disk?

Become a Premium Member for full access
  Unlock Premium Member

Question 482

Report Export Collapse

In which registry does the system store the Microsoft security IDs?

Become a Premium Member for full access
  Unlock Premium Member

Question 483

Report Export Collapse

An investigator has extracted the device descriptor for a 1GB thumb drive that looks like:

Disk&Ven_Best_Buy&Prod_Geek_Squad_U3&Rev_6.15. What does the "Geek_Squad" part represent?

Become a Premium Member for full access
  Unlock Premium Member

Question 484

Report Export Collapse

Which of the following Perl scripts will help an investigator to access the executable image of a process?

Become a Premium Member for full access
  Unlock Premium Member

Question 485

Report Export Collapse

Which of the following attack uses HTML tags like ?

Become a Premium Member for full access
  Unlock Premium Member

Question 486

Report Export Collapse

Examination of a computer by a technically unauthorized person will almost always result in:

Become a Premium Member for full access
  Unlock Premium Member

Question 487

Report Export Collapse

Adam, a forensic analyst, is preparing VMs for analyzing a malware. Which of the following is NOT a best practice?

Become a Premium Member for full access
  Unlock Premium Member

Question 488

Report Export Collapse

The Recycle Bin exists as a metaphor for throwing files away, but it also allows a user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin?

Become a Premium Member for full access
  Unlock Premium Member

Question 489

Report Export Collapse

During an investigation of an XSS attack, the investigator comes across the term "[a-zA-Z0-9\%]+" in analyzed evidence details. What is the expression used for?

Become a Premium Member for full access
  Unlock Premium Member

Question 490

Report Export Collapse

Which among the following search warrants allows the first responder to search and seize the victim's computer components such as hardware, software, storage devices, and documentation?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions