ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 59

Question list
Search
Search

List of questions

Search

Related questions











Which of the following components within the android architecture stack take care of displaying windows owned by different applications?

A.
Media Framework
A.
Media Framework
Answers
B.
Surface Manager
B.
Surface Manager
Answers
C.
Resource Manager
C.
Resource Manager
Answers
D.
Application Framework
D.
Application Framework
Answers
Suggested answer: D

Which among the following web application threats is resulted when developers expose various internal implementation objects, such as files, directories, database records, or key-through references?

A.
Remote File Inclusion
A.
Remote File Inclusion
Answers
B.
Cross Site Scripting
B.
Cross Site Scripting
Answers
C.
Insecure Direct Object References
C.
Insecure Direct Object References
Answers
D.
Cross Site Request Forgery
D.
Cross Site Request Forgery
Answers
Suggested answer: C

What does Locard's Exchange Principle state?

A.
Any information of probative value that is either stored or transmitted in a digital form
A.
Any information of probative value that is either stored or transmitted in a digital form
Answers
B.
Digital evidence must have some characteristics to be disclosed in the court of law
B.
Digital evidence must have some characteristics to be disclosed in the court of law
Answers
C.
Anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave
C.
Anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave
Answers
D.
Forensic investigators face many challenges during forensics investigation of a digital crime, such as extracting, preserving, and analyzing the digital evidence
D.
Forensic investigators face many challenges during forensics investigation of a digital crime, such as extracting, preserving, and analyzing the digital evidence
Answers
Suggested answer: C

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?

A.
Their first step is to make a hypothesis of what their final findings will be.
A.
Their first step is to make a hypothesis of what their final findings will be.
Answers
B.
Their first step is to create an initial Executive report to show the management team.
B.
Their first step is to create an initial Executive report to show the management team.
Answers
C.
Their first step is to analyze the data they have currently gathered from the company or interviews.
C.
Their first step is to analyze the data they have currently gathered from the company or interviews.
Answers
D.
Their first step is the acquisition of required documents, reviewing of security policies and compliance.
D.
Their first step is the acquisition of required documents, reviewing of security policies and compliance.
Answers
Suggested answer: D

What is the location of a Protective MBR in a GPT disk layout?

A.
Logical Block Address (LBA) 2
A.
Logical Block Address (LBA) 2
Answers
B.
Logical Block Address (LBA) 0
B.
Logical Block Address (LBA) 0
Answers
C.
Logical Block Address (LBA) 1
C.
Logical Block Address (LBA) 1
Answers
D.
Logical Block Address (LBA) 3
D.
Logical Block Address (LBA) 3
Answers
Suggested answer: C

In Linux OS, different log files hold different information, which help the investigators to analyze various issues during a security incident. What information can the investigators obtain from the log file var/log/dmesg?

A.
Kernel ring buffer information
A.
Kernel ring buffer information
Answers
B.
All mail server message logs
B.
All mail server message logs
Answers
C.
Global system messages
C.
Global system messages
Answers
D.
Debugging log messages
D.
Debugging log messages
Answers
Suggested answer: A

Which of these ISO standards define the file system for optical storage media, such as CD-ROM and DVD-ROM?

A.
ISO 9660
A.
ISO 9660
Answers
B.
ISO 13346
B.
ISO 13346
Answers
C.
ISO 9960
C.
ISO 9960
Answers
D.
ISO 13490
D.
ISO 13490
Answers
Suggested answer: A

Which of the following Linux command searches through the current processes and lists the process IDs those match the selection criteria to stdout?

A.
pstree
A.
pstree
Answers
B.
pgrep
B.
pgrep
Answers
C.
ps
C.
ps
Answers
D.
grep
D.
grep
Answers
Suggested answer: B

Which forensic investigation methodology believes that criminals commit crimes solely to benefit their criminal enterprises?

A.
Scientific Working Group on Digital Evidence
A.
Scientific Working Group on Digital Evidence
Answers
B.
Daubert Standard
B.
Daubert Standard
Answers
C.
Enterprise Theory of Investigation
C.
Enterprise Theory of Investigation
Answers
D.
Fyre Standard
D.
Fyre Standard
Answers
Suggested answer: C

Which of these rootkit detection techniques function by comparing a snapshot of the file system, boot records, or memory with a known and trusted baseline?

A.
Signature-Based Detection
A.
Signature-Based Detection
Answers
B.
Integrity-Based Detection
B.
Integrity-Based Detection
Answers
C.
Cross View-Based Detection
C.
Cross View-Based Detection
Answers
D.
Heuristic/Behavior-Based Detection
D.
Heuristic/Behavior-Based Detection
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71