ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











What does the superblock in Linux define?

A.
filesynames
A.
filesynames
Answers
B.
diskgeometr
B.
diskgeometr
Answers
C.
location of the firstinode
C.
location of the firstinode
Answers
D.
available space
D.
available space
Answers
Suggested answer: C

Diskcopy is:

A.
a utility by AccessData
A.
a utility by AccessData
Answers
B.
a standard MS-DOS command
B.
a standard MS-DOS command
Answers
C.
Digital Intelligence utility
C.
Digital Intelligence utility
Answers
D.
dd copying tool
D.
dd copying tool
Answers
Suggested answer: A, B, C, D

Sectors in hard disks typically contain how many bytes?

A.
256
A.
256
Answers
B.
512
B.
512
Answers
C.
1024
C.
1024
Answers
D.
2048
D.
2048
Answers
Suggested answer: B

Area density refers to:

A.
the amount of data per disk
A.
the amount of data per disk
Answers
B.
the amount of data per partition
B.
the amount of data per partition
Answers
C.
the amount of data per square inch
C.
the amount of data per square inch
Answers
D.
the amount of data per platter
D.
the amount of data per platter
Answers
Suggested answer: A

Corporate investigations are typically easier than public investigations because:

A.
the users have standard corporate equipment and software
A.
the users have standard corporate equipment and software
Answers
B.
the investigator does not have to get a warrant
B.
the investigator does not have to get a warrant
Answers
C.
the investigator has to get a warrant
C.
the investigator has to get a warrant
Answers
D.
the users can load whatever they want on their machines
D.
the users can load whatever they want on their machines
Answers
Suggested answer: B

Which of the following should a computer forensics lab used for investigations have?

A.
isolation
A.
isolation
Answers
B.
restricted access
B.
restricted access
Answers
C.
open access
C.
open access
Answers
D.
an entry log
D.
an entry log
Answers
Suggested answer: B

Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately.

Which organization coordinates computer crimes investigations throughout the United States?

A.
Internet Fraud Complaint Center
A.
Internet Fraud Complaint Center
Answers
B.
Local or national office of the U.S. Secret Service
B.
Local or national office of the U.S. Secret Service
Answers
C.
National Infrastructure Protection Center
C.
National Infrastructure Protection Center
Answers
D.
CERT Coordination Center
D.
CERT Coordination Center
Answers
Suggested answer: B

Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?

A.
network-based IDS systems (NIDS)
A.
network-based IDS systems (NIDS)
Answers
B.
host-based IDS systems (HIDS)
B.
host-based IDS systems (HIDS)
Answers
C.
anomaly detection
C.
anomaly detection
Answers
D.
signature recognition
D.
signature recognition
Answers
Suggested answer: B

You should make at least how many bit-stream copies of a suspect drive?

A.
1
A.
1
Answers
B.
2
B.
2
Answers
C.
3
C.
3
Answers
D.
4
D.
4
Answers
Suggested answer: B

Why should you note all cable connections for a computer you want to seize as evidence?

A.
to know what outside connections existed
A.
to know what outside connections existed
Answers
B.
in case other devices were connected
B.
in case other devices were connected
Answers
C.
to know what peripheral devices exist
C.
to know what peripheral devices exist
Answers
D.
to know what hardware existed
D.
to know what hardware existed
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71