ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 63

Question list
Search
Search

List of questions

Search

Related questions











Jack is reviewing file headers to verify the file format and hopefully find more Information of the file.

After a careful review of the data chunks through a hex editor; Jack finds the binary value Oxffd8ff.

Based on the above Information, what type of format is the file/image saved as?

A.
BMP
A.
BMP
Answers
B.
GIF
B.
GIF
Answers
C.
ASCII
C.
ASCII
Answers
D.
JPEG
D.
JPEG
Answers
Suggested answer: D

Brian has the job of analyzing malware for a software security company. Brian has setup a virtual environment that includes virtual machines running various versions of OSes. Additionally, Brian has setup separated virtual networks within this environment The virtual environment does not connect to the company's intranet nor does it connect to the external Internet. With everything setup, Brian now received an executable file from client that has undergone a cyberattack.

Brian ran the executable file In the virtual environment to see what it would do. What type of analysis did Brian perform?

A.
Static malware analysis
A.
Static malware analysis
Answers
B.
Status malware analysis
B.
Status malware analysis
Answers
C.
Dynamic malware analysis
C.
Dynamic malware analysis
Answers
D.
Static OS analysis
D.
Static OS analysis
Answers
Suggested answer: C

When Investigating a system, the forensics analyst discovers that malicious scripts were Injected Into benign and trusted websites. The attacker used a web application to send malicious code. In the form of a browser side script, to a different end-user. What attack was performed here?

A.
Brute-force attack
A.
Brute-force attack
Answers
B.
Cookie poisoning attack
B.
Cookie poisoning attack
Answers
C.
Cross-site scripting attack
C.
Cross-site scripting attack
Answers
D.
SQL injection attack
D.
SQL injection attack
Answers
Suggested answer: C

A file requires 10 KB space to be saved on a hard disk partition. An entire cluster of 32 KB has been allocated for this file. The remaining, unused space of 22 KB on this cluster will be Identified as______.

A.
Swap space
A.
Swap space
Answers
B.
Cluster space
B.
Cluster space
Answers
C.
Slack space
C.
Slack space
Answers
D.
Sector space
D.
Sector space
Answers
Suggested answer: C

Which of the following tools will allow a forensic Investigator to acquire the memory dump of a suspect machine so that It may be Investigated on a forensic workstation to collect evidentiary data like processes and Tor browser artifacts?

A.
DB Browser SQLite
A.
DB Browser SQLite
Answers
B.
Bulk Extractor
B.
Bulk Extractor
Answers
C.
Belkasoft Live RAM Capturer and AccessData FTK imager
C.
Belkasoft Live RAM Capturer and AccessData FTK imager
Answers
D.
Hex Editor
D.
Hex Editor
Answers
Suggested answer: C

Which of the following statements pertaining to First Response is true?

A.
First Response is a part of the investigation phase
A.
First Response is a part of the investigation phase
Answers
B.
First Response is a part of the post-investigation phase
B.
First Response is a part of the post-investigation phase
Answers
C.
First Response is a part of the pre-investigation phase
C.
First Response is a part of the pre-investigation phase
Answers
D.
First Response is neither a part of pre-investigation phase nor a part of investigation phase. It only involves attending to a crime scene first and taking measures that assist forensic investigators in executing their tasks in the investigation phase more efficiently
D.
First Response is neither a part of pre-investigation phase nor a part of investigation phase. It only involves attending to a crime scene first and taking measures that assist forensic investigators in executing their tasks in the investigation phase more efficiently
Answers
Suggested answer: A

Consider a scenario where the perpetrator of a dark web crime has unlnstalled Tor browser from their computer after committing the crime. The computer has been seized by law enforcement so they can Investigate It for artifacts of Tor browser usage. Which of the following should the Investigators examine to establish the use of Tor browser on the suspect machine?

A.
Swap files
A.
Swap files
Answers
B.
Files in Recycle Bin
B.
Files in Recycle Bin
Answers
C.
Security logs
C.
Security logs
Answers
D.
Prefetch files
D.
Prefetch files
Answers
Suggested answer: D

A cybercriminal is attempting to remove evidence from a Windows computer. He deletes the file evldence1.doc. sending it to Windows Recycle Bin. The cybercriminal then empties the Recycle Bin.

After having been removed from the Recycle Bin. what will happen to the data?

A.
The data will remain in its original clusters until it is overwritten
A.
The data will remain in its original clusters until it is overwritten
Answers
B.
The data will be moved to new clusters in unallocated space
B.
The data will be moved to new clusters in unallocated space
Answers
C.
The data will become corrupted, making it unrecoverable
C.
The data will become corrupted, making it unrecoverable
Answers
D.
The data will be overwritten with zeroes
D.
The data will be overwritten with zeroes
Answers
Suggested answer: A

Jeff is a forensics investigator for a government agency's cyber security office. Jeff Is tasked with acquiring a memory dump of a Windows 10 computer that was involved In a DDoS attack on the government agency's web application. Jeff is onsite to collect the memory. What tool could Jeff use?

A.
Volatility
A.
Volatility
Answers
B.
Autopsy
B.
Autopsy
Answers
C.
RAM Mapper
C.
RAM Mapper
Answers
D.
Memcheck
D.
Memcheck
Answers
Suggested answer: A

Derrick, a forensic specialist, was investigating an active computer that was executing various processes. Derrick wanted to check whether this system was used In an Incident that occurred earlier. He started Inspecting and gathering the contents of RAM, cache, and DLLs to Identify Incident signatures. Identify the data acquisition method employed by Derrick in the above scenario.

A.
Dead data acquisition
A.
Dead data acquisition
Answers
B.
Static data acquisition
B.
Static data acquisition
Answers
C.
Non-volatile data acquisition
C.
Non-volatile data acquisition
Answers
D.
Live data acquisition
D.
Live data acquisition
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71