ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 53

Question list
Search
Search

Related questions











What is the name of the first reserved sector in File allocation table?

A.
Volume Boot Record
A.
Volume Boot Record
Answers
B.
Partition Boot Sector
B.
Partition Boot Sector
Answers
C.
Master Boot Record
C.
Master Boot Record
Answers
D.
BIOS Parameter Block
D.
BIOS Parameter Block
Answers
Suggested answer: C

What does the command "C:\>wevtutil gl " display?

A.
Configuration information of a specific Event Log
A.
Configuration information of a specific Event Log
Answers
B.
Event logs are saved in .xml format
B.
Event logs are saved in .xml format
Answers
C.
Event log record structure
C.
Event log record structure
Answers
D.
List of available Event Logs
D.
List of available Event Logs
Answers
Suggested answer: A

An investigator is analyzing a checkpoint firewall log and comes across symbols. What type of log is he looking at?

A.
Security event was monitored but not stopped
A.
Security event was monitored but not stopped
Answers
B.
Malicious URL detected
B.
Malicious URL detected
Answers
C.
An email marked as potential spam
C.
An email marked as potential spam
Answers
D.
Connection rejected
D.
Connection rejected
Answers
Suggested answer: C

For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?

A.
Bypassing iPhone passcode
A.
Bypassing iPhone passcode
Answers
B.
Debugging iPhone
B.
Debugging iPhone
Answers
C.
Rooting iPhone
C.
Rooting iPhone
Answers
D.
Copying contents of iPhone
D.
Copying contents of iPhone
Answers
Suggested answer: A

Which of the following does Microsoft Exchange E-mail Server use for collaboration of various e-mail applications?

A.
Simple Mail Transfer Protocol (SMTP)
A.
Simple Mail Transfer Protocol (SMTP)
Answers
B.
Messaging Application Programming Interface (MAPI)
B.
Messaging Application Programming Interface (MAPI)
Answers
C.
Internet Message Access Protocol (IMAP)
C.
Internet Message Access Protocol (IMAP)
Answers
D.
Post Office Protocol version 3 (POP3)
D.
Post Office Protocol version 3 (POP3)
Answers
Suggested answer: B

Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?

A.
Directory Table
A.
Directory Table
Answers
B.
Rainbow Table
B.
Rainbow Table
Answers
C.
Master file Table (MFT)
C.
Master file Table (MFT)
Answers
D.
Partition Table
D.
Partition Table
Answers
Suggested answer: B

What is the capacity of Recycle bin in a system running on Windows Vista?

A.
2.99GB
A.
2.99GB
Answers
B.
3.99GB
B.
3.99GB
Answers
C.
Unlimited
C.
Unlimited
Answers
D.
10% of the partition space
D.
10% of the partition space
Answers
Suggested answer: C

Brian needs to acquire data from RAID storage. Which of the following acquisition methods is recommended to retrieve only the data relevant to the investigation?

A.
Static Acquisition
A.
Static Acquisition
Answers
B.
Sparse or Logical Acquisition
B.
Sparse or Logical Acquisition
Answers
C.
Bit-stream disk-to-disk Acquisition
C.
Bit-stream disk-to-disk Acquisition
Answers
D.
Bit-by-bit Acquisition
D.
Bit-by-bit Acquisition
Answers
Suggested answer: B

Analyze the hex representation of mysql-bin.000013 file in the screenshot below. Which of the following will be an inference from this analysis?

A.
A user with username bad_guy has logged into the WordPress web application
A.
A user with username bad_guy has logged into the WordPress web application
Answers
B.
A WordPress user has been created with the username anonymous_hacker
B.
A WordPress user has been created with the username anonymous_hacker
Answers
C.
An attacker with name anonymous_hacker has replaced a user bad_guy in the WordPress database
C.
An attacker with name anonymous_hacker has replaced a user bad_guy in the WordPress database
Answers
D.
A WordPress user has been created with the username bad_guy
D.
A WordPress user has been created with the username bad_guy
Answers
Suggested answer: D

What technique is used by JPEGs for compression?

A.
TIFF-8
A.
TIFF-8
Answers
B.
ZIP
B.
ZIP
Answers
C.
DCT
C.
DCT
Answers
D.
TCD
D.
TCD
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71