ECCouncil 312-49v10 Practice Test - Questions Answers, Page 50
List of questions
Related questions
Centralized binary logging is a process in which many websites write binary and unformatted log data to a single log file. What extension should the investigator look to find its log file?
Where should the investigator look for the Edge browser's browsing records, including history, cache, and cookies?
Which of the following setups should a tester choose to analyze malware behavior?
A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?
What is the purpose of using Obfuscator in malware?
Which of the following commands shows you the username and IP address used to access the system via a remote login session and the type of client from which they are accessing the system?
Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?
UEFI is a specification that defines a software interface between an OS and platform firmware.
Where does this interface store information about files present on a disk?
You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a "simple backup copy" of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a "simple backup copy" will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?
Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted so as to cause a denial-of-service attack?
Question