ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 60

Question list
Search
Search

Related questions











Which program uses different techniques to conceal a malware's code, thereby making it difficult for security mechanisms to detect or remove it?

A.
Dropper
A.
Dropper
Answers
B.
Packer
B.
Packer
Answers
C.
Injector
C.
Injector
Answers
D.
Obfuscator
D.
Obfuscator
Answers
Suggested answer: D

What does the bytes 0x0B-0x53 represent in the boot sector of NTFS volume on Windows 2000?

A.
Jump instruction and the OEM ID
A.
Jump instruction and the OEM ID
Answers
B.
BIOS Parameter Block (BPB) and the OEM ID
B.
BIOS Parameter Block (BPB) and the OEM ID
Answers
C.
BIOS Parameter Block (BPB) and the extended BPB
C.
BIOS Parameter Block (BPB) and the extended BPB
Answers
D.
Bootstrap code and the end of the sector marker
D.
Bootstrap code and the end of the sector marker
Answers
Suggested answer: C

What does the Rule 101 of Federal Rules of Evidence states?

A.
Scope of the Rules, where they can be applied
A.
Scope of the Rules, where they can be applied
Answers
B.
Purpose of the Rules
B.
Purpose of the Rules
Answers
C.
Limited Admissibility of the Evidence
C.
Limited Admissibility of the Evidence
Answers
D.
Rulings on Evidence
D.
Rulings on Evidence
Answers
Suggested answer: A

What document does the screenshot represent?

A.
Expert witness form
A.
Expert witness form
Answers
B.
Search warrant form
B.
Search warrant form
Answers
C.
Chain of custody form
C.
Chain of custody form
Answers
D.
Evidence collection form
D.
Evidence collection form
Answers
Suggested answer: D

You are asked to build a forensic lab and your manager has specifically informed you to use copper for lining the walls, ceilings, and floor. What is the main purpose of lining the walls, ceilings, and floor with copper?

A.
To control the room temperature
A.
To control the room temperature
Answers
B.
To strengthen the walls, ceilings, and floor
B.
To strengthen the walls, ceilings, and floor
Answers
C.
To avoid electromagnetic emanations
C.
To avoid electromagnetic emanations
Answers
D.
To make the lab sound proof
D.
To make the lab sound proof
Answers
Suggested answer: D

James is dealing with a case regarding a cybercrime that has taken place in Arizona, US

A.
James needs to lawfully seize the evidence from an electronic device without affecting the user's anonymity. Which of the following law should he comply with, before retrieving the evidence?
A.
James needs to lawfully seize the evidence from an electronic device without affecting the user's anonymity. Which of the following law should he comply with, before retrieving the evidence?
Answers
B.
First Amendment of the U.S. Constitution
B.
First Amendment of the U.S. Constitution
Answers
C.
Fourth Amendment of the U.S. Constitution
C.
Fourth Amendment of the U.S. Constitution
Answers
D.
Third Amendment of the U.S. Constitution
D.
Third Amendment of the U.S. Constitution
Answers
E.
Fifth Amendment of the U.S. Constitution
E.
Fifth Amendment of the U.S. Constitution
Answers
Suggested answer: D

Which of the following stand true for BIOS Parameter Block?

A.
The BIOS Partition Block describes the physical layout of a data storage volume
A.
The BIOS Partition Block describes the physical layout of a data storage volume
Answers
B.
The BIOS Partition Block is the first sector of a data storage device
B.
The BIOS Partition Block is the first sector of a data storage device
Answers
C.
The length of BIOS Partition Block remains the same across all the file systems
C.
The length of BIOS Partition Block remains the same across all the file systems
Answers
D.
The BIOS Partition Block always refers to the 512-byte boot sector
D.
The BIOS Partition Block always refers to the 512-byte boot sector
Answers
Suggested answer: A

Which Event Correlation approach assumes and predicts what an attacker can do next after the attack by studying statistics and probability?

A.
Profile/Fingerprint-Based Approach
A.
Profile/Fingerprint-Based Approach
Answers
B.
Bayesian Correlation
B.
Bayesian Correlation
Answers
C.
Time (Clock Time) or Role-Based Approach
C.
Time (Clock Time) or Role-Based Approach
Answers
D.
Automated Field Correlation
D.
Automated Field Correlation
Answers
Suggested answer: B

MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network.

A.
48-bit address
A.
48-bit address
Answers
B.
24-bit address
B.
24-bit address
Answers
C.
16-bit address
C.
16-bit address
Answers
D.
32-bit address
D.
32-bit address
Answers
Suggested answer: A

Which of the following files store the MySQL database data permanently, including the data that had been deleted, helping the forensic investigator in examining the case and finding the culprit?

A.
mysql-bin
A.
mysql-bin
Answers
B.
mysql-log
B.
mysql-log
Answers
C.
iblog
C.
iblog
Answers
D.
ibdata1
D.
ibdata1
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71