ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 50

Question list
Search
Search

List of questions

Search

Related questions











Centralized binary logging is a process in which many websites write binary and unformatted log data to a single log file. What extension should the investigator look to find its log file?

A.
.cbl
A.
.cbl
Answers
B.
.log
B.
.log
Answers
C.
.ibl
C.
.ibl
Answers
D.
.txt
D.
.txt
Answers
Suggested answer: C

Where should the investigator look for the Edge browser's browsing records, including history, cache, and cookies?

A.
ESE Database
A.
ESE Database
Answers
B.
Virtual Memory
B.
Virtual Memory
Answers
C.
Sparse files
C.
Sparse files
Answers
D.
Slack Space
D.
Slack Space
Answers
Suggested answer: A

Which of the following setups should a tester choose to analyze malware behavior?

A.
A virtual system with internet connection
A.
A virtual system with internet connection
Answers
B.
A normal system without internet connect
B.
A normal system without internet connect
Answers
C.
A normal system with internet connection
C.
A normal system with internet connection
Answers
D.
A virtual system with network simulation for internet connection
D.
A virtual system with network simulation for internet connection
Answers
Suggested answer: D

A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?

A.
/auth
A.
/auth
Answers
B.
/proc
B.
/proc
Answers
C.
/var/log/debug
C.
/var/log/debug
Answers
D.
/var/spool/cron/
D.
/var/spool/cron/
Answers
Suggested answer: B

What is the purpose of using Obfuscator in malware?

A.
Execute malicious code in the system
A.
Execute malicious code in the system
Answers
B.
Avoid encryption while passing through a VPN
B.
Avoid encryption while passing through a VPN
Answers
C.
Avoid detection by security mechanisms
C.
Avoid detection by security mechanisms
Answers
D.
Propagate malware to other connected devices
D.
Propagate malware to other connected devices
Answers
Suggested answer: C

Which of the following commands shows you the username and IP address used to access the system via a remote login session and the type of client from which they are accessing the system?

A.
Net config
A.
Net config
Answers
B.
Net sessions
B.
Net sessions
Answers
C.
Net share
C.
Net share
Answers
D.
Net stat
D.
Net stat
Answers
Suggested answer: B

Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?

A.
SOX
A.
SOX
Answers
B.
HIPAA 1996
B.
HIPAA 1996
Answers
C.
GLBA
C.
GLBA
Answers
D.
PCI DSS
D.
PCI DSS
Answers
Suggested answer: C

UEFI is a specification that defines a software interface between an OS and platform firmware.

Where does this interface store information about files present on a disk?

A.
BIOS-MBR
A.
BIOS-MBR
Answers
B.
GUID Partition Table (GPT)
B.
GUID Partition Table (GPT)
Answers
C.
Master Boot Record (MBR)
C.
Master Boot Record (MBR)
Answers
D.
BIOS Parameter Block
D.
BIOS Parameter Block
Answers
Suggested answer: B

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a "simple backup copy" of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a "simple backup copy" will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

A.
Robust copy
A.
Robust copy
Answers
B.
Incremental backup copy
B.
Incremental backup copy
Answers
C.
Bit-stream copy
C.
Bit-stream copy
Answers
D.
Full backup copy
D.
Full backup copy
Answers
Suggested answer: C

Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted so as to cause a denial-of-service attack?

A.
Email spamming
A.
Email spamming
Answers
B.
Phishing
B.
Phishing
Answers
C.
Email spoofing
C.
Email spoofing
Answers
D.
Mail bombing
D.
Mail bombing
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71