ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 64

List of questions

Question 631

Report Export Collapse

In forensics.______are used lo view stored or deleted data from both files and disk sectors.

Become a Premium Member for full access
  Unlock Premium Member

Question 632

Report Export Collapse

Which of the following methods of mobile device data acquisition captures all the data present on the device, as well as all deleted data and access to unallocated space?

Become a Premium Member for full access
  Unlock Premium Member

Question 633

Report Export Collapse

Which Federal Rule of Evidence speaks about the Hearsay exception where the availability of the declarant Is immaterial and certain characteristics of the declarant such as present sense Impression, excited utterance, and recorded recollection are also observed while giving their testimony?

Become a Premium Member for full access
  Unlock Premium Member

Question 634

Report Export Collapse

What command-line tool enables forensic Investigator to establish communication between an Android device and a forensic workstation in order to perform data acquisition from the device?

Become a Premium Member for full access
  Unlock Premium Member

Question 635

Report Export Collapse

An Investigator Is checking a Cisco firewall log that reads as follows:

Aug 21 2019 09:16:44: %ASA-1-106021: Deny ICMP reverse path check from 10.0.0.44 to 10.0.0.33 on Interface outside What does %ASA-1-106021 denote?

Become a Premium Member for full access
  Unlock Premium Member

Question 636

Report Export Collapse

A breach resulted from a malware attack that evaded detection and compromised the machine memory without installing any software or accessing the hard drive. What technique did the adversaries use to deliver the attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 637

Report Export Collapse

Ronald, a forensic investigator, has been hired by a financial services organization to Investigate an attack on their MySQL database server, which Is hosted on a Windows machine named WINDTRAI83202X.

Ronald wants to retrieve information on the changes that have been made to the database. Which of the following files should Ronald examine for this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 638

Report Export Collapse

Debbie has obtained a warrant to search a known pedophiles house. Debbie went to the house and executed the search warrant to seize digital devices that have been recorded as being used for downloading Illicit Images. She seized all digital devices except a digital camer a. Why did she not collect the digital camera?

Become a Premium Member for full access
  Unlock Premium Member

Question 639

Report Export Collapse

Place the following In order of volatility from most volatile to the least volatile.

Become a Premium Member for full access
  Unlock Premium Member

Question 640

Report Export Collapse

Fill In the missing Master Boot Record component.

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions