ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 65

Question list
Search
Search

List of questions

Search

Related questions











Which of the following attacks refers to unintentional download of malicious software via the Internet? Here, an attacker exploits flaws in browser software to install malware merely by the user visiting the malicious website.

A.
Malvertising
A.
Malvertising
Answers
B.
Internet relay chats
B.
Internet relay chats
Answers
C.
Drive-by downloads
C.
Drive-by downloads
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: C

"To ensure that the digital evidence is collected, preserved, examined, or transferred In a manner safeguarding the accuracy and reliability of the evidence, law enforcement, and forensics organizations must establish and maintain an effective quality system" Is a principle established by:

A.
NCIS
A.
NCIS
Answers
B.
NIST
B.
NIST
Answers
C.
EC-Council
C.
EC-Council
Answers
D.
SWGDE
D.
SWGDE
Answers
Suggested answer: D

James, a forensics specialist, was tasked with investigating a Windows XP machine that was used for malicious online activities. During the Investigation, he recovered certain deleted files from Recycle Bin to Identify attack clues.

Identify the location of Recycle Bin in Windows XP system.

A.
Drive:\$Recycle.Bin\
A.
Drive:\$Recycle.Bin\
Answers
B.
Iocal/sha re/Trash
B.
Iocal/sha re/Trash
Answers
C.
Drive:\RECYCLER\
C.
Drive:\RECYCLER\
Answers
D.
DriveARECYCLED
D.
DriveARECYCLED
Answers
Suggested answer: A

Recently, an Internal web app that a government agency utilizes has become unresponsive, Betty, a network engineer for the government agency, has been tasked to determine the cause of the web application's unresponsiveness. Betty launches Wlreshark and begins capturing the traffic on the local network. While analyzing the results, Betty noticed that a syn flood attack was underway. How did Betty know a syn flood attack was occurring?

A.
Wireshark capture shows multiple ACK requests and SYN responses from single/multiple IP address(es)
A.
Wireshark capture shows multiple ACK requests and SYN responses from single/multiple IP address(es)
Answers
B.
Wireshark capture does not show anything unusual and the issue is related to the web application
B.
Wireshark capture does not show anything unusual and the issue is related to the web application
Answers
C.
Wireshark capture shows multiple SYN requests and RST responses from single/multiple IP address(es)
C.
Wireshark capture shows multiple SYN requests and RST responses from single/multiple IP address(es)
Answers
D.
Wireshark capture shows multiple SYN requests and ACK responses from single/multiple IP address(es)
D.
Wireshark capture shows multiple SYN requests and ACK responses from single/multiple IP address(es)
Answers
Suggested answer: C

During an Investigation, the first responders stored mobile devices In specific containers to provide network Isolation. All the following are examples of such pieces of equipment, except for:

A.
Wireless StrongHold bag
A.
Wireless StrongHold bag
Answers
B.
VirtualBox
B.
VirtualBox
Answers
C.
Faraday bag
C.
Faraday bag
Answers
D.
RF shield box
D.
RF shield box
Answers
Suggested answer: B

Maria has executed a suspicious executable file In a controlled environment and wants to see if the file adds/modifies any registry value after execution via Windows Event Viewer. Which of the following event ID should she look for In this scenario?

A.
Event ID 4657
A.
Event ID 4657
Answers
B.
Event ID 4624
B.
Event ID 4624
Answers
C.
Event ID 4688
C.
Event ID 4688
Answers
D.
Event ID 7040
D.
Event ID 7040
Answers
Suggested answer: A

SO/IEC 17025 is an accreditation for which of the following:

A.
CHFI issuing agency
A.
CHFI issuing agency
Answers
B.
Encryption
B.
Encryption
Answers
C.
Forensics lab licensing
C.
Forensics lab licensing
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: C

Edgar is part of the FBI's forensic media and malware analysis team; he Is analyzing a current malware and Is conducting a thorough examination of the suspect system, network, and other connected devices. Edgar's approach Is to execute the malware code to know how It Interacts with the host system and Its Impacts on It. He is also using a virtual machine and a sandbox environment.

What type of malware analysis is Edgar performing?

A.
Malware disassembly
A.
Malware disassembly
Answers
B.
VirusTotal analysis
B.
VirusTotal analysis
Answers
C.
Static analysis
C.
Static analysis
Answers
D.
Dynamic malware analysis/behavioral analysis
D.
Dynamic malware analysis/behavioral analysis
Answers
Suggested answer: D

A computer forensics Investigator or forensic analyst Is a specially trained professional who works with law enforcement as well as private businesses to retrieve Information from computers and other types of data storage devices. For this, the analyst should have an excellent working knowledge of all aspects of the computer. Which of the following is not a duty of the analyst during a criminal investigation?

A.
To create an investigation report
A.
To create an investigation report
Answers
B.
To fill the chain of custody
B.
To fill the chain of custody
Answers
C.
To recover data from suspect devices
C.
To recover data from suspect devices
Answers
D.
To enforce the security of all devices and software in the scene
D.
To enforce the security of all devices and software in the scene
Answers
Suggested answer: B

This law sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.

A.
The CAN-SPAM act
A.
The CAN-SPAM act
Answers
B.
Federal Spam act
B.
Federal Spam act
Answers
C.
Telemarketing act
C.
Telemarketing act
Answers
D.
European Anti-Spam act
D.
European Anti-Spam act
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71