ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 51

Add to Whishlist

List of questions

Question 501

Report Export Collapse

Gill is a computer forensics investigator who has been called upon to examine a seized computer.

This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer's log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies' domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?

Become a Premium Member for full access
  Unlock Premium Member

Question 502

Report Export Collapse

An attacker has compromised a cloud environment of a company and used the employee information to perform an identity theft attack. Which type of attack is this?

Become a Premium Member for full access
  Unlock Premium Member

Question 503

Report Export Collapse

In which implementation of RAID will the image of a Hardware RAID volume be different from the image taken separately from the disks?

Become a Premium Member for full access
  Unlock Premium Member

Question 504

Report Export Collapse

One technique for hiding information is to change the file extension from the correct one to the one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?

Become a Premium Member for full access
  Unlock Premium Member

Question 505

Report Export Collapse

An investigator enters the command sqlcmd -S WIN-CQQMK62867E -e -s"," -E as part of collecting the primary data file and logs from a database. What does the "WIN-CQQMK62867E" represent?

Become a Premium Member for full access
  Unlock Premium Member

Question 506

Report Export Collapse

During the trial, an investigator observes that one of the principal witnesses is severely ill and cannot be present for the hearing. He decides to record the evidence and present it to the court. Under which rule should he present such evidence?

Become a Premium Member for full access
  Unlock Premium Member

Question 507

Report Export Collapse

What is cold boot (hard boot)?

Become a Premium Member for full access
  Unlock Premium Member

Question 508

Report Export Collapse

What does the 56.58.152.114(445) denote in a Cisco router log?

Jun 19 23:25:46.125 EST: %SEC-4-IPACCESSLOGP: list internet-inbound denied udp 67.124.115.35(8084) -> 56.58.152.114(445), 1 packet

Become a Premium Member for full access
  Unlock Premium Member

Question 509

Report Export Collapse

Which among the following laws emphasizes the need for each Federal agency to develop, document, and implement an organization-wide program to provide information security for the information systems that support its operations and assets?

Become a Premium Member for full access
  Unlock Premium Member

Question 510

Report Export Collapse

Which of the following techniques delete the files permanently?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions