ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 50

Add to Whishlist

List of questions

Question 491

Report Export Collapse

Centralized binary logging is a process in which many websites write binary and unformatted log data to a single log file. What extension should the investigator look to find its log file?

Become a Premium Member for full access
  Unlock Premium Member

Question 492

Report Export Collapse

Where should the investigator look for the Edge browser's browsing records, including history, cache, and cookies?

Become a Premium Member for full access
  Unlock Premium Member

Question 493

Report Export Collapse

Which of the following setups should a tester choose to analyze malware behavior?

Become a Premium Member for full access
  Unlock Premium Member

Question 494

Report Export Collapse

A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?

Become a Premium Member for full access
  Unlock Premium Member

Question 495

Report Export Collapse

What is the purpose of using Obfuscator in malware?

Become a Premium Member for full access
  Unlock Premium Member

Question 496

Report Export Collapse

Which of the following commands shows you the username and IP address used to access the system via a remote login session and the type of client from which they are accessing the system?

Become a Premium Member for full access
  Unlock Premium Member

Question 497

Report Export Collapse

Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?

Become a Premium Member for full access
  Unlock Premium Member

Question 498

Report Export Collapse

UEFI is a specification that defines a software interface between an OS and platform firmware.

Where does this interface store information about files present on a disk?

Become a Premium Member for full access
  Unlock Premium Member

Question 499

Report Export Collapse

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a "simple backup copy" of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a "simple backup copy" will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

Become a Premium Member for full access
  Unlock Premium Member

Question 500

Report Export Collapse

Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted so as to cause a denial-of-service attack?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions