ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 66

Question list
Search
Search

List of questions

Search

Related questions











A clothing company has recently deployed a website on Its latest product line to Increase Its conversion rate and base of customers. Andrew, the network administrator recently appointed by the company, has been assigned with the task of protecting the website from Intrusion and vulnerabilities. Which of the following tool should Andrew consider deploying in this scenario?

A.
ModSecurity
A.
ModSecurity
Answers
B.
CryptaPix
B.
CryptaPix
Answers
C.
Recuva
C.
Recuva
Answers
D.
Kon-Boot
D.
Kon-Boot
Answers
Suggested answer: A

A forensic analyst has been tasked with investigating unusual network activity Inside a retail company's network. Employees complain of not being able to access services, frequent rebooting, and anomalies In log files. The Investigator requested log files from the IT administrator and after carefully reviewing them, he finds the following log entry:

What type of attack was performed on the companies' web application?

A.
Directory transversal
A.
Directory transversal
Answers
B.
Unvalidated input
B.
Unvalidated input
Answers
C.
Log tampering
C.
Log tampering
Answers
D.
SQL injection
D.
SQL injection
Answers
Suggested answer: D

On NTFS file system, which of the following tools can a forensic Investigator use In order to identify timestomping of evidence files?

A.
wbStego
A.
wbStego
Answers
B.
Exiv2
B.
Exiv2
Answers
C.
analyzeMFT
C.
analyzeMFT
Answers
D.
Timestomp
D.
Timestomp
Answers
Suggested answer: C

Rule 1002 of Federal Rules of Evidence (US) talks about_____

A.
Admissibility of original
A.
Admissibility of original
Answers
B.
Admissibility of duplicates
B.
Admissibility of duplicates
Answers
C.
Requirement of original
C.
Requirement of original
Answers
D.
Admissibility of other evidence of contents
D.
Admissibility of other evidence of contents
Answers
Suggested answer: C

Which of the following Ii considered as the starting point of a database and stores user data and database objects in an MS SQL server?

A.
Ibdata1
A.
Ibdata1
Answers
B.
Application data files (ADF)
B.
Application data files (ADF)
Answers
C.
Transaction log data files (LDF)
C.
Transaction log data files (LDF)
Answers
D.
Primary data files (MDF)
D.
Primary data files (MDF)
Answers
Suggested answer: D

Which of the following statements is true with respect to SSDs (solid-state drives)?

A.
Like HDDs. SSDs also have moving parts
A.
Like HDDs. SSDs also have moving parts
Answers
B.
SSDs cannot store non-volatile data
B.
SSDs cannot store non-volatile data
Answers
C.
SSDs contain tracks, clusters, and sectors to store data
C.
SSDs contain tracks, clusters, and sectors to store data
Answers
D.
Faster data access, lower power usage, and higher reliability are some of the m<="" p="">
D.
Faster data access, lower power usage, and higher reliability are some of the m<="" p="">
Answers
Suggested answer: D

To understand the impact of a malicious program after the booting process and to collect recent information from the disk partition, an Investigator should evaluate the content of the:

A.
MBR
A.
MBR
Answers
B.
GRUB
B.
GRUB
Answers
C.
UEFI
C.
UEFI
Answers
D.
BIOS
D.
BIOS
Answers
Suggested answer: A

During a forensic investigation, a large number of files were collected. The investigator needs to evaluate ownership and accountability of those files. Therefore, he begins to Identify attributes such as "author name," "organization name." "network name," or any additional supporting data that is meant for the owner's Identification purpose. Which term describes these attributes?

A.
Data header
A.
Data header
Answers
B.
Data index
B.
Data index
Answers
C.
Metabase
C.
Metabase
Answers
D.
Metadata
D.
Metadata
Answers
Suggested answer: D

The working of the Tor browser is based on which of the following concepts?

A.
Both static and default routing
A.
Both static and default routing
Answers
B.
Default routing
B.
Default routing
Answers
C.
Static routing
C.
Static routing
Answers
D.
Onion routing
D.
Onion routing
Answers
Suggested answer: D

An EC2 instance storing critical data of a company got infected with malware. The forensics team took the EBS volume snapshot of the affected Instance to perform further analysis and collected other data of evidentiary value. What should be their next step?

A.
They should pause the running instance
A.
They should pause the running instance
Answers
B.
They should keep the instance running as it stores critical data
B.
They should keep the instance running as it stores critical data
Answers
C.
They should terminate all instances connected via the same VPC
C.
They should terminate all instances connected via the same VPC
Answers
D.
They should terminate the instance after taking necessary backup
D.
They should terminate the instance after taking necessary backup
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71