ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 52

Question list
Search
Search

Related questions











What is an investigator looking for in the rp.log file stored in a system running on Windows 10 operating system?

A.
Restore point interval
A.
Restore point interval
Answers
B.
Automatically created restore points
B.
Automatically created restore points
Answers
C.
System CheckPoints required for restoring
C.
System CheckPoints required for restoring
Answers
D.
Restore point functions
D.
Restore point functions
Answers
Suggested answer: C

Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?

A.
Server storage archives are the server information and settings stored on a local system, whereas the local archives are the local email client information stored on the mail server
A.
Server storage archives are the server information and settings stored on a local system, whereas the local archives are the local email client information stored on the mail server
Answers
B.
It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers
B.
It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers
Answers
C.
Local archives should be stored together with the server storage archives in order to be admissible in a court of law
C.
Local archives should be stored together with the server storage archives in order to be admissible in a court of law
Answers
D.
Local archives do not have evidentiary value as the email client may alter the message data
D.
Local archives do not have evidentiary value as the email client may alter the message data
Answers
Suggested answer: B

Which of the following tool is used to locate IP addresses?

A.
SmartWhois
A.
SmartWhois
Answers
B.
Deep Log Analyzer
B.
Deep Log Analyzer
Answers
C.
Towelroot
C.
Towelroot
Answers
D.
XRY LOGICAL
D.
XRY LOGICAL
Answers
Suggested answer: A

Which of the following protocols allows non-ASCII files, such as video, graphics, and audio, to be sent through the email messages?

A.
MIME
A.
MIME
Answers
B.
BINHEX
B.
BINHEX
Answers
C.
UT-16
C.
UT-16
Answers
D.
UUCODE
D.
UUCODE
Answers
Suggested answer: A

What is the framework used for application development for iOS-based mobile devices?

A.
Cocoa Touch
A.
Cocoa Touch
Answers
B.
Dalvik
B.
Dalvik
Answers
C.
Zygote
C.
Zygote
Answers
D.
AirPlay
D.
AirPlay
Answers
Suggested answer: A

Chong-lee, a forensics executive, suspects that a malware is continuously making copies of files and folders on a victim system to consume the available disk space. What type of test would confirm his claim?

A.
File fingerprinting
A.
File fingerprinting
Answers
B.
Identifying file obfuscation
B.
Identifying file obfuscation
Answers
C.
Static analysis
C.
Static analysis
Answers
D.
Dynamic analysis
D.
Dynamic analysis
Answers
Suggested answer: A

Which of the following tools is not a data acquisition hardware tool?

A.
UltraKit
A.
UltraKit
Answers
B.
Atola Insight Forensic
B.
Atola Insight Forensic
Answers
C.
F-Response Imager
C.
F-Response Imager
Answers
D.
Triage-Responder
D.
Triage-Responder
Answers
Suggested answer: C

The given image displays information about date and time of installation of the OS along with service packs, patches, and sub-directories. What command or tool did the investigator use to view this output?

A.
dir /o:d
A.
dir /o:d
Answers
B.
dir /o:s
B.
dir /o:s
Answers
C.
dir /o:e
C.
dir /o:e
Answers
D.
dir /o:n
D.
dir /o:n
Answers
Suggested answer: A

Which list contains the most recent actions performed by a Windows User?

A.
MRU
A.
MRU
Answers
B.
Activity
B.
Activity
Answers
C.
Recents
C.
Recents
Answers
D.
Windows Error Log
D.
Windows Error Log
Answers
Suggested answer: A

Joshua is analyzing an MSSQL database for finding the attack evidence and other details, where should he look for the database logs?

A.
Model.log
A.
Model.log
Answers
B.
Model.txt
B.
Model.txt
Answers
C.
Model.ldf
C.
Model.ldf
Answers
D.
Model.lgf
D.
Model.lgf
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71