ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 64

Question list
Search
Search

List of questions

Search

Related questions











In forensics.______are used lo view stored or deleted data from both files and disk sectors.

A.
Hash algorithms
A.
Hash algorithms
Answers
B.
SI EM tools
B.
SI EM tools
Answers
C.
Host interfaces
C.
Host interfaces
Answers
D.
Hex editors
D.
Hex editors
Answers
Suggested answer: D

Which of the following methods of mobile device data acquisition captures all the data present on the device, as well as all deleted data and access to unallocated space?

A.
Manual acquisition
A.
Manual acquisition
Answers
B.
Logical acquisition
B.
Logical acquisition
Answers
C.
Direct acquisition
C.
Direct acquisition
Answers
D.
Physical acquisition
D.
Physical acquisition
Answers
Suggested answer: D

Which Federal Rule of Evidence speaks about the Hearsay exception where the availability of the declarant Is immaterial and certain characteristics of the declarant such as present sense Impression, excited utterance, and recorded recollection are also observed while giving their testimony?

A.
Rule 801
A.
Rule 801
Answers
B.
Rule 802
B.
Rule 802
Answers
C.
Rule 804
C.
Rule 804
Answers
D.
Rule 803
D.
Rule 803
Answers
Suggested answer: D

What command-line tool enables forensic Investigator to establish communication between an Android device and a forensic workstation in order to perform data acquisition from the device?

A.
APK Analyzer
A.
APK Analyzer
Answers
B.
SDK Manager
B.
SDK Manager
Answers
C.
Android Debug Bridge
C.
Android Debug Bridge
Answers
D.
Xcode
D.
Xcode
Answers
Suggested answer: C

An Investigator Is checking a Cisco firewall log that reads as follows:

Aug 21 2019 09:16:44: %ASA-1-106021: Deny ICMP reverse path check from 10.0.0.44 to 10.0.0.33 on Interface outside What does %ASA-1-106021 denote?

A.
Mnemonic message
A.
Mnemonic message
Answers
B.
Type of traffic
B.
Type of traffic
Answers
C.
Firewall action
C.
Firewall action
Answers
D.
Type of request
D.
Type of request
Answers
Suggested answer: A

A breach resulted from a malware attack that evaded detection and compromised the machine memory without installing any software or accessing the hard drive. What technique did the adversaries use to deliver the attack?

A.
Fileless
A.
Fileless
Answers
B.
Trojan
B.
Trojan
Answers
C.
JavaScript
C.
JavaScript
Answers
D.
Spyware
D.
Spyware
Answers
Suggested answer: A

Ronald, a forensic investigator, has been hired by a financial services organization to Investigate an attack on their MySQL database server, which Is hosted on a Windows machine named WINDTRAI83202X.

Ronald wants to retrieve information on the changes that have been made to the database. Which of the following files should Ronald examine for this task?

A.
relay-log.info
A.
relay-log.info
Answers
B.
WIN-DTRAl83202Xrelay-bin.index
B.
WIN-DTRAl83202Xrelay-bin.index
Answers
C.
WIN-DTRAI83202Xslow.log
C.
WIN-DTRAI83202Xslow.log
Answers
D.
WIN-DTRAI83202X-bin.nnnnnn
D.
WIN-DTRAI83202X-bin.nnnnnn
Answers
Suggested answer: C

Debbie has obtained a warrant to search a known pedophiles house. Debbie went to the house and executed the search warrant to seize digital devices that have been recorded as being used for downloading Illicit Images. She seized all digital devices except a digital camer a. Why did she not collect the digital camera?

A.
The digital camera was not listed as one of the digital devices in the warrant
A.
The digital camera was not listed as one of the digital devices in the warrant
Answers
B.
The vehicle Debbie was using to transport the evidence was already full and could not carry more items
B.
The vehicle Debbie was using to transport the evidence was already full and could not carry more items
Answers
C.
Debbie overlooked the digital camera because it is not a computer system
C.
Debbie overlooked the digital camera because it is not a computer system
Answers
D.
The digital camera was old. had a cracked screen, and did not have batteries. Therefore, it could not have been used in a crime.
D.
The digital camera was old. had a cracked screen, and did not have batteries. Therefore, it could not have been used in a crime.
Answers
Suggested answer: A

Place the following In order of volatility from most volatile to the least volatile.

A.
Registers and cache, routing tables, temporary file systems, disk storage, archival media
A.
Registers and cache, routing tables, temporary file systems, disk storage, archival media
Answers
B.
Register and cache, temporary file systems, routing tables, disk storage, archival media
B.
Register and cache, temporary file systems, routing tables, disk storage, archival media
Answers
C.
Registers and cache, routing tables, temporary file systems, archival media, disk storage
C.
Registers and cache, routing tables, temporary file systems, archival media, disk storage
Answers
D.
Archival media, temporary file systems, disk storage, archival media, register and cache
D.
Archival media, temporary file systems, disk storage, archival media, register and cache
Answers
Suggested answer: C

Fill In the missing Master Boot Record component.

A.
Master boot code
A.
Master boot code
Answers
B.
Partition table 3._______________
B.
Partition table 3._______________
Answers
C.
Boot loader
C.
Boot loader
Answers
D.
Signature word
D.
Signature word
Answers
E.
Volume boot record
E.
Volume boot record
Answers
F.
Disk signature
F.
Disk signature
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71