ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 55

Question list
Search
Search

List of questions

Search

Related questions











Jim's company regularly performs backups of their critical servers. But the company can't afford to send backup tapes to an off-site vendor for long term storage and archiving. Instead Jim's company keeps the backup tapes in a safe in the office. Jim's company is audited each year, and the results from this year's audit show a risk because backup tapes aren't stored off-site. The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?

A.
Encrypt the backup tapes and use a courier to transport them.
A.
Encrypt the backup tapes and use a courier to transport them.
Answers
B.
Encrypt the backup tapes and transport them in a lock box
B.
Encrypt the backup tapes and transport them in a lock box
Answers
C.
Degauss the backup tapes and transport them in a lock box.
C.
Degauss the backup tapes and transport them in a lock box.
Answers
D.
Hash the backup tapes and transport them in a lock box.
D.
Hash the backup tapes and transport them in a lock box.
Answers
Suggested answer: B

As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?

A.
Status of users connected to the internet
A.
Status of users connected to the internet
Answers
B.
Net status of computer usage
B.
Net status of computer usage
Answers
C.
Information about network connections
C.
Information about network connections
Answers
D.
Status of network hardware
D.
Status of network hardware
Answers
Suggested answer: C

Which of the following files contains the traces of the applications installed, run, or uninstalled from a system?

A.
Virtual Files
A.
Virtual Files
Answers
B.
Image Files
B.
Image Files
Answers
C.
Shortcut Files
C.
Shortcut Files
Answers
D.
Prefetch Files
D.
Prefetch Files
Answers
Suggested answer: C

Amber, a black hat hacker, has embedded malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?

A.
Malvertising
A.
Malvertising
Answers
B.
Compromising a legitimate site
B.
Compromising a legitimate site
Answers
C.
Click-jacking
C.
Click-jacking
Answers
D.
Spearphishing
D.
Spearphishing
Answers
Suggested answer: A

Buffer overflow vulnerabilities, of web applications, occurs when the application fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the _________.

There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.

A.
Adjacent buffer locations
A.
Adjacent buffer locations
Answers
B.
Adjacent string locations
B.
Adjacent string locations
Answers
C.
Adjacent bit blocks
C.
Adjacent bit blocks
Answers
D.
Adjacent memory locations
D.
Adjacent memory locations
Answers
Suggested answer: D

Which of the following is NOT an anti-forensics technique?

A.
Data Deduplication
A.
Data Deduplication
Answers
B.
Password Protection
B.
Password Protection
Answers
C.
Encryption
C.
Encryption
Answers
D.
Steganography
D.
Steganography
Answers
Suggested answer: A

Select the tool appropriate for finding the dynamically linked lists of an application or malware.

A.
SysAnalyzer
A.
SysAnalyzer
Answers
B.
ResourcesExtract
B.
ResourcesExtract
Answers
C.
PEiD
C.
PEiD
Answers
D.
Dependency Walker
D.
Dependency Walker
Answers
Suggested answer: D

Bob has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drives. He wants to recover all the data, which includes his personal photos, music, documents, videos, official emails, etc. Which of the following tools shall resolve Bob's purpose?

A.
Cain & Abel
A.
Cain & Abel
Answers
B.
Recuva
B.
Recuva
Answers
C.
Xplico
C.
Xplico
Answers
D.
Colasoft's Capsa
D.
Colasoft's Capsa
Answers
Suggested answer: B

In a computer that has Dropbox client installed, which of the following files related to the Dropbox client store information about local Dropbox installation and the Dropbox user account, along with email IDs linked with the account?

A.
config.db
A.
config.db
Answers
B.
install.db
B.
install.db
Answers
C.
sigstore.db
C.
sigstore.db
Answers
D.
filecache.db
D.
filecache.db
Answers
Suggested answer: A

Robert is a regional manager working in a reputed organization. One day, he suspected malware attack after unwanted programs started to popup after logging into his computer. The network administrator was called upon to trace out any intrusion on the computer and he/she finds that suspicious activity has taken place within Autostart locations. In this situation, which of the following tools is used by the network administrator to detect any intrusion on a system?

A.
Hex Editor
A.
Hex Editor
Answers
B.
Internet Evidence Finder
B.
Internet Evidence Finder
Answers
C.
Process Monitor
C.
Process Monitor
Answers
D.
Report Viewer
D.
Report Viewer
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71