ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 62

List of questions

Question 611

Report Export Collapse

An investigator needs to perform data acquisition from a storage media without altering its contents to maintain the Integrity of the content. The approach adopted by the Investigator relies upon the capacity of enabling read-only access to the storage medi a. Which tool should the Investigator Integrate Into his/her procedures to accomplish this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 612

Report Export Collapse

During an Investigation. Noel found a SIM card from the suspect's mobile. The ICCID on the card is 8944245252001451548.

What does the first four digits (89 and 44) In the ICCID represent?

Become a Premium Member for full access
  Unlock Premium Member

Question 613

Report Export Collapse

Which following forensic tool allows investigator to detect and extract hidden streams on NTFS drive?

Become a Premium Member for full access
  Unlock Premium Member

Question 614

Report Export Collapse

Cybercriminals sometimes use compromised computers to commit other crimes, which may involve using computers or networks to spread malware or Illegal Information. Which type of cybercrime stops users from using a device or network, or prevents a company from providing a software service to its customers?

Become a Premium Member for full access
  Unlock Premium Member

Question 615

Report Export Collapse

When installed on a Windows machine, which port does the Tor browser use to establish a network connection via Tor nodes?

Become a Premium Member for full access
  Unlock Premium Member

Question 616

Report Export Collapse

An investigator wants to extract passwords from SAM and System Files. Which tool can the Investigator use to obtain a list of users, passwords, and their hashes In this case?

Become a Premium Member for full access
  Unlock Premium Member

Question 617

Report Export Collapse

William is examining a log entry that reads 192.168.0.1 - - [18/Jan/2020:12:42:29 +0000) "GET / HTTP/1.1" 200 1861. Which of the following logs does the log entry belong to?

Become a Premium Member for full access
  Unlock Premium Member

Question 618

Report Export Collapse

What happens lo the header of the file once It Is deleted from the Windows OS file systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 619

Report Export Collapse

Sally accessed the computer system that holds trade secrets of the company where she Is employed.

She knows she accessed It without authorization and all access (authorized and unauthorized) to this computer Is monitored.To cover her tracks. Sally deleted the log entries on this computer. What among the following best describes her action?

Become a Premium Member for full access
  Unlock Premium Member

Question 620

Report Export Collapse

Fred, a cybercrime Investigator for the FBI, finished storing a solid-state drive In a static resistant bag and filled out the chain of custody form. Two days later. John grabbed the solid-state drive and created a clone of It (with write blockers enabled) In order to Investigate the drive. He did not document the chain of custody though. When John was finished, he put the solid-state drive back in the static resistant and placed it back in the evidence locker. A day later, the court trial began and upon presenting the evidence and the supporting documents, the chief Justice outright rejected them. Which of the following statements strongly support the reason for rejecting the evidence?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions