ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 62

Question list
Search
Search

List of questions

Search

Related questions











An investigator needs to perform data acquisition from a storage media without altering its contents to maintain the Integrity of the content. The approach adopted by the Investigator relies upon the capacity of enabling read-only access to the storage medi a. Which tool should the Investigator Integrate Into his/her procedures to accomplish this task?

A.
BitLocker
A.
BitLocker
Answers
B.
Data duplication tool
B.
Data duplication tool
Answers
C.
Backup tool
C.
Backup tool
Answers
D.
Write blocker
D.
Write blocker
Answers
Suggested answer: B

During an Investigation. Noel found a SIM card from the suspect's mobile. The ICCID on the card is 8944245252001451548.

What does the first four digits (89 and 44) In the ICCID represent?

A.
TAC and industry identifier
A.
TAC and industry identifier
Answers
B.
Country code and industry identifier
B.
Country code and industry identifier
Answers
C.
Industry identifier and country code
C.
Industry identifier and country code
Answers
D.
Issuer identifier number and TAC
D.
Issuer identifier number and TAC
Answers
Suggested answer: C

Which following forensic tool allows investigator to detect and extract hidden streams on NTFS drive?

A.
Stream Detector
A.
Stream Detector
Answers
B.
TimeStomp
B.
TimeStomp
Answers
C.
Autopsy
C.
Autopsy
Answers
D.
analyzeMFT
D.
analyzeMFT
Answers
Suggested answer: A

Cybercriminals sometimes use compromised computers to commit other crimes, which may involve using computers or networks to spread malware or Illegal Information. Which type of cybercrime stops users from using a device or network, or prevents a company from providing a software service to its customers?

A.
Denial-of-Service (DoS) attack
A.
Denial-of-Service (DoS) attack
Answers
B.
Malware attack
B.
Malware attack
Answers
C.
Ransomware attack
C.
Ransomware attack
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: A

When installed on a Windows machine, which port does the Tor browser use to establish a network connection via Tor nodes?

A.
7680
A.
7680
Answers
B.
49667/49668
B.
49667/49668
Answers
C.
9150/9151
C.
9150/9151
Answers
D.
49664/49665
D.
49664/49665
Answers
Suggested answer: C

An investigator wants to extract passwords from SAM and System Files. Which tool can the Investigator use to obtain a list of users, passwords, and their hashes In this case?

A.
PWdump7
A.
PWdump7
Answers
B.
HashKey
B.
HashKey
Answers
C.
Nuix
C.
Nuix
Answers
D.
FileMerlin
D.
FileMerlin
Answers
Suggested answer: A

William is examining a log entry that reads 192.168.0.1 - - [18/Jan/2020:12:42:29 +0000) "GET / HTTP/1.1" 200 1861. Which of the following logs does the log entry belong to?

A.
The combined log format of Apache access log
A.
The combined log format of Apache access log
Answers
B.
The common log format of Apache access log
B.
The common log format of Apache access log
Answers
C.
Apache error log
C.
Apache error log
Answers
D.
IIS log
D.
IIS log
Answers
Suggested answer: B

What happens lo the header of the file once It Is deleted from the Windows OS file systems?

A.
The OS replaces the first letter of a deleted file name with a hex byte code: E5h
A.
The OS replaces the first letter of a deleted file name with a hex byte code: E5h
Answers
B.
The OS replaces the entire hex byte coding of the file.
B.
The OS replaces the entire hex byte coding of the file.
Answers
C.
The hex byte coding of the file remains the same, but the file location differs
C.
The hex byte coding of the file remains the same, but the file location differs
Answers
D.
The OS replaces the second letter of a deleted file name with a hex byte code: Eh5
D.
The OS replaces the second letter of a deleted file name with a hex byte code: Eh5
Answers
Suggested answer: A

Sally accessed the computer system that holds trade secrets of the company where she Is employed.

She knows she accessed It without authorization and all access (authorized and unauthorized) to this computer Is monitored.To cover her tracks. Sally deleted the log entries on this computer. What among the following best describes her action?

A.
Password sniffing
A.
Password sniffing
Answers
B.
Anti-forensics
B.
Anti-forensics
Answers
C.
Brute-force attack
C.
Brute-force attack
Answers
D.
Network intrusion
D.
Network intrusion
Answers
Suggested answer: B

Fred, a cybercrime Investigator for the FBI, finished storing a solid-state drive In a static resistant bag and filled out the chain of custody form. Two days later. John grabbed the solid-state drive and created a clone of It (with write blockers enabled) In order to Investigate the drive. He did not document the chain of custody though. When John was finished, he put the solid-state drive back in the static resistant and placed it back in the evidence locker. A day later, the court trial began and upon presenting the evidence and the supporting documents, the chief Justice outright rejected them. Which of the following statements strongly support the reason for rejecting the evidence?

A.
Block clones cannot be created with solid-state drives
A.
Block clones cannot be created with solid-state drives
Answers
B.
Write blockers were used while cloning the evidence
B.
Write blockers were used while cloning the evidence
Answers
C.
John did not document the chain of custody
C.
John did not document the chain of custody
Answers
D.
John investigated the clone instead of the original evidence itself
D.
John investigated the clone instead of the original evidence itself
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71