ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 61

Question list
Search
Search

List of questions

Search

Related questions











Which tool allows dumping the contents of process memory without stopping the process?

A.
psdump.exe
A.
psdump.exe
Answers
B.
pmdump.exe
B.
pmdump.exe
Answers
C.
processdump.exe
C.
processdump.exe
Answers
D.
pdump.exe
D.
pdump.exe
Answers
Suggested answer: B

Explanation:

Topic 4, Exam Pool D

Explanation:

Which OWASP loT vulnerability talks about security flaws such as lack of firmware validation, lack of secure delivery, and lack of anti-rollback mechanisms on loT devices?

A.
Lack of secure update mechanism
A.
Lack of secure update mechanism
Answers
B.
Use of insecure or outdated components
B.
Use of insecure or outdated components
Answers
C.
Insecure default settings
C.
Insecure default settings
Answers
D.
Insecure data transfer and storage
D.
Insecure data transfer and storage
Answers
Suggested answer: A

Assume there Is a file named myflle.txt In C: drive that contains hidden data streams. Which of the following commands would you Issue to display the contents of a data stream?

A.
echo text > program: source_file
A.
echo text > program: source_file
Answers
B.
myfile.dat: st ream 1
B.
myfile.dat: st ream 1
Answers
C.
C:\MORE < myfile.txt:siream1
C.
C:\MORE < myfile.txt:siream1
Answers
D.
C:\>ECHO text_message > myfile.txt:stream1
D.
C:\>ECHO text_message > myfile.txt:stream1
Answers
Suggested answer: C

Adam Is thinking of establishing a hospital In the US and approaches John, a software developer to build a site and host it for him on one of the servers, which would be used to store patient health records. He has learned from his legal advisors that he needs to have the server's log data reviewed and managed according to certain standards and regulations. Which of the following regulations are the legal advisors referring to?

A.
Data Protection Act of 2018
A.
Data Protection Act of 2018
Answers
B.
Payment Card Industry Data Security Standard (PCI DSS)
B.
Payment Card Industry Data Security Standard (PCI DSS)
Answers
C.
Electronic Communications Privacy Act
C.
Electronic Communications Privacy Act
Answers
D.
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
D.
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Answers
Suggested answer: D

In a Fllesystem Hierarchy Standard (FHS), which of the following directories contains the binary files required for working?

A.
/sbin
A.
/sbin
Answers
B.
/proc
B.
/proc
Answers
C.
/mm
C.
/mm
Answers
D.
/media
D.
/media
Answers
Suggested answer: A

Harry has collected a suspicious executable file from an infected system and seeks to reverse its machine code to Instructions written in assembly language. Which tool should he use for this purpose?

A.
Ollydbg
A.
Ollydbg
Answers
B.
oledump
B.
oledump
Answers
C.
HashCalc
C.
HashCalc
Answers
D.
BinText
D.
BinText
Answers
Suggested answer: A

A forensic examiner encounters a computer with a failed OS installation and the master boot record (MBR) or partition sector damaged. Which of the following tools can find and restore files and Information In the disk?

A.
Helix
A.
Helix
Answers
B.
R-Studio
B.
R-Studio
Answers
C.
NetCat
C.
NetCat
Answers
D.
Wireshark
D.
Wireshark
Answers
Suggested answer: A

In Java, when multiple applications are launched, multiple Dalvik Virtual Machine instances occur that consume memory and time. To avoid that. Android Implements a process that enables low memory consumption and quick start-up time. What is the process called?

A.
init
A.
init
Answers
B.
Media server
B.
Media server
Answers
C.
Zygote
C.
Zygote
Answers
D.
Daemon
D.
Daemon
Answers
Suggested answer: C

"In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to explain his/her actions and the impact of those actions on the evidence, in the court." Which ACPO principle states this?

A.
Principle 1
A.
Principle 1
Answers
B.
Principle 3
B.
Principle 3
Answers
C.
Principle 4
C.
Principle 4
Answers
D.
Principle 2
D.
Principle 2
Answers
Suggested answer: D

______allows a forensic investigator to identify the missing links during investigation.

A.
Evidence preservation
A.
Evidence preservation
Answers
B.
Chain of custody
B.
Chain of custody
Answers
C.
Evidence reconstruction
C.
Evidence reconstruction
Answers
D.
Exhibit numbering
D.
Exhibit numbering
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71