ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 57

Question list
Search
Search

List of questions

Search

Related questions











In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?

A.
Chosen-message attack
A.
Chosen-message attack
Answers
B.
Known-cover attack
B.
Known-cover attack
Answers
C.
Known-message attack
C.
Known-message attack
Answers
D.
Known-stego attack
D.
Known-stego attack
Answers
Suggested answer: A

Which of these Windows utility help you to repair logical file system errors?

A.
Resource Monitor
A.
Resource Monitor
Answers
B.
Disk cleanup
B.
Disk cleanup
Answers
C.
Disk defragmenter
C.
Disk defragmenter
Answers
D.
CHKDSK
D.
CHKDSK
Answers
Suggested answer: D

Identify the term that refers to individuals who, by virtue of their knowledge and expertise, express an independent opinion on a matter related to a case based on the information that is provided.

A.
Expert Witness
A.
Expert Witness
Answers
B.
Evidence Examiner
B.
Evidence Examiner
Answers
C.
Forensic Examiner
C.
Forensic Examiner
Answers
D.
Defense Witness
D.
Defense Witness
Answers
Suggested answer: A

Steve, a forensic investigator, was asked to investigate an email incident in his organization. The organization has Microsoft Exchange Server deployed for email communications. Which among the following files will Steve check to analyze message headers, message text, and standard attachments?

A.
PUB.EDB
A.
PUB.EDB
Answers
B.
PRIV.EDB
B.
PRIV.EDB
Answers
C.
PUB.STM
C.
PUB.STM
Answers
D.
PRIV.STM
D.
PRIV.STM
Answers
Suggested answer: B

Which of the following information is displayed when Netstat is used with -ano switch?

A.
Ethernet statistics
A.
Ethernet statistics
Answers
B.
Contents of IP routing table
B.
Contents of IP routing table
Answers
C.
Details of routing table
C.
Details of routing table
Answers
D.
Details of TCP and UDP connections
D.
Details of TCP and UDP connections
Answers
Suggested answer: D

While collecting Active Transaction Logs using SQL Server Management Studio, the query Select * from ::fn_dblog(NULL, NULL) displays the active portion of the transaction log file. Here, assigning NULL values implies?

A.
Start and end points for log sequence numbers are specified
A.
Start and end points for log sequence numbers are specified
Answers
B.
Start and end points for log files are not specified
B.
Start and end points for log files are not specified
Answers
C.
Start and end points for log files are specified
C.
Start and end points for log files are specified
Answers
D.
Start and end points for log sequence numbers are not specified
D.
Start and end points for log sequence numbers are not specified
Answers
Suggested answer: B

Which of the following statements is TRUE with respect to the Registry settings in the user start-up folder HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\.

A.
All the values in this subkey run when specific user logs on, as this setting is user-specific
A.
All the values in this subkey run when specific user logs on, as this setting is user-specific
Answers
B.
The string specified in the value run executes when user logs on
B.
The string specified in the value run executes when user logs on
Answers
C.
All the values in this key are executed at system start-up
C.
All the values in this key are executed at system start-up
Answers
D.
All values in this subkey run when specific user logs on and then the values are deleted
D.
All values in this subkey run when specific user logs on and then the values are deleted
Answers
Suggested answer: D

Which cloud model allows an investigator to acquire the instance of a virtual machine and initiate the forensics examination process?

A.
PaaS model
A.
PaaS model
Answers
B.
IaaS model
B.
IaaS model
Answers
C.
SaaS model
C.
SaaS model
Answers
D.
SecaaS model
D.
SecaaS model
Answers
Suggested answer: B

An attacker successfully gained access to a remote Windows system and plans to install persistent backdoors on it. Before that, to avoid getting detected in future, he wants to cover his tracks by disabling the last-accessed timestamps of the machine. What would he do to achieve this?

A.
Set the registry value ofHKLM\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisableLastAccessUpdate to 0
A.
Set the registry value ofHKLM\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisableLastAccessUpdate to 0
Answers
B.
Run the command fsutil behavior set disablelastaccess 0
B.
Run the command fsutil behavior set disablelastaccess 0
Answers
C.
Set the registry value ofHKLM\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisableLastAccessUpdate to 1
C.
Set the registry value ofHKLM\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisableLastAccessUpdate to 1
Answers
D.
Run the command fsutil behavior set enablelastaccess 0
D.
Run the command fsutil behavior set enablelastaccess 0
Answers
Suggested answer: C

Which of the following web browser uses the Extensible Storage Engine (ESE) database format to store browsing records, including history, cache, and cookies?

A.
Safari
A.
Safari
Answers
B.
Mozilla Firefox
B.
Mozilla Firefox
Answers
C.
Microsoft Edge
C.
Microsoft Edge
Answers
D.
Google Chrome
D.
Google Chrome
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71