ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 49

Question list
Search
Search

List of questions

Search

Related questions











While analyzing a hard disk, the investigator finds that the file system does not use UEFI-based interface. Which of the following operating systems is present on the hard disk?

A.
Windows 10
A.
Windows 10
Answers
B.
Windows 8
B.
Windows 8
Answers
C.
Windows 7
C.
Windows 7
Answers
D.
Windows 8.1
D.
Windows 8.1
Answers
Suggested answer: C

In which registry does the system store the Microsoft security IDs?

A.
HKEY_CLASSES_ROOT (HKCR)
A.
HKEY_CLASSES_ROOT (HKCR)
Answers
B.
HKEY_CURRENT_CONFIG (HKCC)
B.
HKEY_CURRENT_CONFIG (HKCC)
Answers
C.
HKEY_CURRENT_USER (HKCU)
C.
HKEY_CURRENT_USER (HKCU)
Answers
D.
HKEY_LOCAL_MACHINE (HKLM)
D.
HKEY_LOCAL_MACHINE (HKLM)
Answers
Suggested answer: D

An investigator has extracted the device descriptor for a 1GB thumb drive that looks like:

Disk&Ven_Best_Buy&Prod_Geek_Squad_U3&Rev_6.15. What does the "Geek_Squad" part represent?

A.
Product description
A.
Product description
Answers
B.
Manufacturer Details
B.
Manufacturer Details
Answers
C.
Developer description
C.
Developer description
Answers
D.
Software or OS used
D.
Software or OS used
Answers
Suggested answer: A

Which of the following Perl scripts will help an investigator to access the executable image of a process?

A.
Lspd.pl
A.
Lspd.pl
Answers
B.
Lpsi.pl
B.
Lpsi.pl
Answers
C.
Lspm.pl
C.
Lspm.pl
Answers
D.
Lspi.pl
D.
Lspi.pl
Answers
Suggested answer: D

Which of the following attack uses HTML tags like ?

A.
Phishing
A.
Phishing
Answers
B.
XSS attack
B.
XSS attack
Answers
C.
SQL injection
C.
SQL injection
Answers
D.
Spam
D.
Spam
Answers
Suggested answer: B

Examination of a computer by a technically unauthorized person will almost always result in:

A.
Rendering any evidence found inadmissible in a court of law
A.
Rendering any evidence found inadmissible in a court of law
Answers
B.
Completely accurate results of the examination
B.
Completely accurate results of the examination
Answers
C.
The chain of custody being fully maintained
C.
The chain of custody being fully maintained
Answers
D.
Rendering any evidence found admissible in a court of law
D.
Rendering any evidence found admissible in a court of law
Answers
Suggested answer: A

Adam, a forensic analyst, is preparing VMs for analyzing a malware. Which of the following is NOT a best practice?

A.
Isolating the host device
A.
Isolating the host device
Answers
B.
Installing malware analysis tools
B.
Installing malware analysis tools
Answers
C.
Using network simulation tools
C.
Using network simulation tools
Answers
D.
Enabling shared folders
D.
Enabling shared folders
Answers
Suggested answer: D

The Recycle Bin exists as a metaphor for throwing files away, but it also allows a user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin?

A.
INFO2
A.
INFO2
Answers
B.
INFO1
B.
INFO1
Answers
C.
LOGINFO1
C.
LOGINFO1
Answers
D.
LOGINFO2
D.
LOGINFO2
Answers
Suggested answer: A

During an investigation of an XSS attack, the investigator comes across the term "[a-zA-Z0-9\%]+" in analyzed evidence details. What is the expression used for?

A.
Checks for upper and lower-case alphanumeric string inside the tag, or its hex representation
A.
Checks for upper and lower-case alphanumeric string inside the tag, or its hex representation
Answers
B.
Checks for forward slash used in HTML closing tags, its hex or double-encoded hex equivalent
B.
Checks for forward slash used in HTML closing tags, its hex or double-encoded hex equivalent
Answers
C.
Checks for opening angle bracket, its hex or double-encoded hex equivalent
C.
Checks for opening angle bracket, its hex or double-encoded hex equivalent
Answers
D.
Checks for closing angle bracket, hex or double-encoded hex equivalent
D.
Checks for closing angle bracket, hex or double-encoded hex equivalent
Answers
Suggested answer: B

Which among the following search warrants allows the first responder to search and seize the victim's computer components such as hardware, software, storage devices, and documentation?

A.
John Doe Search Warrant
A.
John Doe Search Warrant
Answers
B.
Citizen Informant Search Warrant
B.
Citizen Informant Search Warrant
Answers
C.
Electronic Storage Device Search Warrant
C.
Electronic Storage Device Search Warrant
Answers
D.
Service Provider Search Warrant
D.
Service Provider Search Warrant
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71