ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 51

Question list
Search
Search

List of questions

Search

Related questions











Gill is a computer forensics investigator who has been called upon to examine a seized computer.

This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer's log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies' domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?

A.
Syllable attack
A.
Syllable attack
Answers
B.
Hybrid attack
B.
Hybrid attack
Answers
C.
Brute force attack
C.
Brute force attack
Answers
D.
Dictionary attack
D.
Dictionary attack
Answers
Suggested answer: D

An attacker has compromised a cloud environment of a company and used the employee information to perform an identity theft attack. Which type of attack is this?

A.
Cloud as a subject
A.
Cloud as a subject
Answers
B.
Cloud as a tool
B.
Cloud as a tool
Answers
C.
Cloud as an object
C.
Cloud as an object
Answers
D.
Cloud as a service
D.
Cloud as a service
Answers
Suggested answer: A

In which implementation of RAID will the image of a Hardware RAID volume be different from the image taken separately from the disks?

A.
RAID 1
A.
RAID 1
Answers
B.
The images will always be identical because data is mirrored for redundancy
B.
The images will always be identical because data is mirrored for redundancy
Answers
C.
RAID 0
C.
RAID 0
Answers
D.
It will always be different
D.
It will always be different
Answers
Suggested answer: D

One technique for hiding information is to change the file extension from the correct one to the one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?

A.
The file header
A.
The file header
Answers
B.
The File Allocation Table
B.
The File Allocation Table
Answers
C.
The file footer
C.
The file footer
Answers
D.
The sector map
D.
The sector map
Answers
Suggested answer: A

An investigator enters the command sqlcmd -S WIN-CQQMK62867E -e -s"," -E as part of collecting the primary data file and logs from a database. What does the "WIN-CQQMK62867E" represent?

A.
Name of the Database
A.
Name of the Database
Answers
B.
Name of SQL Server
B.
Name of SQL Server
Answers
C.
Operating system of the system
C.
Operating system of the system
Answers
D.
Network credentials of the database
D.
Network credentials of the database
Answers
Suggested answer: B

During the trial, an investigator observes that one of the principal witnesses is severely ill and cannot be present for the hearing. He decides to record the evidence and present it to the court. Under which rule should he present such evidence?

A.
Rule 1003: Admissibility of Duplicates
A.
Rule 1003: Admissibility of Duplicates
Answers
B.
Limited admissibility
B.
Limited admissibility
Answers
C.
Locard's Principle
C.
Locard's Principle
Answers
D.
Hearsay
D.
Hearsay
Answers
Suggested answer: B

What is cold boot (hard boot)?

A.
It is the process of restarting a computer that is already in sleep mode
A.
It is the process of restarting a computer that is already in sleep mode
Answers
B.
It is the process of shutting down a computer from a powered-on or on state
B.
It is the process of shutting down a computer from a powered-on or on state
Answers
C.
It is the process of restarting a computer that is already turned on through the operating system
C.
It is the process of restarting a computer that is already turned on through the operating system
Answers
D.
It is the process of starting a computer from a powered-down or off state
D.
It is the process of starting a computer from a powered-down or off state
Answers
Suggested answer: D

What does the 56.58.152.114(445) denote in a Cisco router log?

Jun 19 23:25:46.125 EST: %SEC-4-IPACCESSLOGP: list internet-inbound denied udp 67.124.115.35(8084) -> 56.58.152.114(445), 1 packet

A.
Source IP address
A.
Source IP address
Answers
B.
None of the above
B.
None of the above
Answers
C.
Login IP address
C.
Login IP address
Answers
D.
Destination IP address
D.
Destination IP address
Answers
Suggested answer: D

Which among the following laws emphasizes the need for each Federal agency to develop, document, and implement an organization-wide program to provide information security for the information systems that support its operations and assets?

A.
FISMA
A.
FISMA
Answers
B.
HIPAA
B.
HIPAA
Answers
C.
GLBA
C.
GLBA
Answers
D.
SOX
D.
SOX
Answers
Suggested answer: A

Which of the following techniques delete the files permanently?

A.
Steganography
A.
Steganography
Answers
B.
Artifact Wiping
B.
Artifact Wiping
Answers
C.
Data Hiding
C.
Data Hiding
Answers
D.
Trail obfuscation
D.
Trail obfuscation
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71