ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 58

Question list
Search
Search

List of questions

Search

Related questions











Which U.S. law sets the rules for sending emails for commercial purposes, establishes the minimum requirements for commercial messaging, gives the recipients of emails the right to ask the senders to stop emailing them, and spells out the penalties in case the above said rules are violated?

A.
NO-SPAM Act
A.
NO-SPAM Act
Answers
B.
American: NAVSO P-5239-26 (RLL)
B.
American: NAVSO P-5239-26 (RLL)
Answers
C.
CAN-SPAM Act
C.
CAN-SPAM Act
Answers
D.
American: DoD 5220.22-M
D.
American: DoD 5220.22-M
Answers
Suggested answer: C

Which of the following statements is TRUE about SQL Server error logs?

A.
SQL Server error logs record all the events occurred on the SQL Server and its databases
A.
SQL Server error logs record all the events occurred on the SQL Server and its databases
Answers
B.
Forensic investigator uses SQL Server Profiler to view error log files
B.
Forensic investigator uses SQL Server Profiler to view error log files
Answers
C.
Error logs contain IP address of SQL Server client connections
C.
Error logs contain IP address of SQL Server client connections
Answers
D.
Trace files record, user-defined events, and specific system events
D.
Trace files record, user-defined events, and specific system events
Answers
Suggested answer: B

Which among the following tools can help a forensic investigator to access the registry files during postmortem analysis?

A.
RegistryChangesView
A.
RegistryChangesView
Answers
B.
RegDIIView
B.
RegDIIView
Answers
C.
RegRipper
C.
RegRipper
Answers
D.
ProDiscover
D.
ProDiscover
Answers
Suggested answer: C

Consider that you are investigating a machine running an Windows OS released prior to Windows Vist a. You are trying to gather information about the deleted files by examining the master database file named INFO2 located at C:

\Recycler\\. You read an entry named "Dd5.exe". What does Dd5.exe mean?

A.
D drive. fifth file deleted, a .exe file
A.
D drive. fifth file deleted, a .exe file
Answers
B.
D drive, fourth file restored, a .exe file
B.
D drive, fourth file restored, a .exe file
Answers
C.
D drive, fourth file deleted, a .exe file
C.
D drive, fourth file deleted, a .exe file
Answers
D.
D drive, sixth file deleted, a .exe file
D.
D drive, sixth file deleted, a .exe file
Answers
Suggested answer: B

Which Linux command when executed displays kernel ring buffers or information about device drivers loaded into the kernel?

A.
pgrep
A.
pgrep
Answers
B.
dmesg
B.
dmesg
Answers
C.
fsck
C.
fsck
Answers
D.
grep
D.
grep
Answers
Suggested answer: B

A section of your forensics lab houses several electrical and electronic equipment. Which type of fire extinguisher you must install in this area to contain any fire incident?

A.
Class B
A.
Class B
Answers
B.
Class D
B.
Class D
Answers
C.
Class C
C.
Class C
Answers
D.
Class A
D.
Class A
Answers
Suggested answer: C

Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?

A.
The firewall rejected a connection
A.
The firewall rejected a connection
Answers
B.
A virus was detected in an email
B.
A virus was detected in an email
Answers
C.
The firewall dropped a connection
C.
The firewall dropped a connection
Answers
D.
An email was marked as potential spam
D.
An email was marked as potential spam
Answers
Suggested answer: C

In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?

A.
Cloud as an Object
A.
Cloud as an Object
Answers
B.
Cloud as a Tool
B.
Cloud as a Tool
Answers
C.
Cloud as an Application
C.
Cloud as an Application
Answers
D.
Cloud as a Subject
D.
Cloud as a Subject
Answers
Suggested answer: D

POP3 is an Internet protocol, which is used to retrieve emails from a mail server. Through which port does an email client connect with a POP3 server?

A.
110
A.
110
Answers
B.
143
B.
143
Answers
C.
25
C.
25
Answers
D.
993
D.
993
Answers
Suggested answer: A

James, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, James reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did James successfully execute?

A.
Cross Site Request Forgery
A.
Cross Site Request Forgery
Answers
B.
Cookie Tampering
B.
Cookie Tampering
Answers
C.
Parameter Tampering
C.
Parameter Tampering
Answers
D.
Session Fixation Attack
D.
Session Fixation Attack
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71