ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 67

Question list
Search
Search

List of questions

Search

Related questions











You are an information security analyst at a large pharmaceutical company. While performing a routine review of audit logs, you have noticed a significant amount of egress traffic to various IP addresses on destination port 22 during off- peak hours. You researched some of the IP addresses and found that many of them are in Eastern Europe. What is the most likely cause of this traffic?

A.
Malicious software on internal system is downloading research data from partner 5FTP servers in Eastern Europe
A.
Malicious software on internal system is downloading research data from partner 5FTP servers in Eastern Europe
Answers
B.
Internal systems are downloading automatic Windows updates
B.
Internal systems are downloading automatic Windows updates
Answers
C.
Data is being exfiltrated by an advanced persistent threat (APT)
C.
Data is being exfiltrated by an advanced persistent threat (APT)
Answers
D.
The organization's primary internal DNS server has been compromised and is performing DNS zone transfers to malicious external entities
D.
The organization's primary internal DNS server has been compromised and is performing DNS zone transfers to malicious external entities
Answers
Suggested answer: C

Choose the layer in iOS architecture that provides frameworks for iOS app development?

A.
Media services
A.
Media services
Answers
B.
Cocoa Touch
B.
Cocoa Touch
Answers
C.
Core services
C.
Core services
Answers
D.
Core OS
D.
Core OS
Answers
Suggested answer: C

Data density of a disk drive is calculated by using_______

A.
Slack space, bit density, and slack density.
A.
Slack space, bit density, and slack density.
Answers
B.
Track space, bit area, and slack space.
B.
Track space, bit area, and slack space.
Answers
C.
Track density, areal density, and slack density.
C.
Track density, areal density, and slack density.
Answers
D.
Track density, areal density, and bit density.
D.
Track density, areal density, and bit density.
Answers
Suggested answer: D

Web browsers can store relevant information from user activities. Forensic investigators may retrieve files, lists, access history, cookies, among other digital footprints. Which tool can contribute to this task?

A.
Most Recently Used (MRU) list
A.
Most Recently Used (MRU) list
Answers
B.
MZCacheView
B.
MZCacheView
Answers
C.
Google Chrome Recovery Utility
C.
Google Chrome Recovery Utility
Answers
D.
Task Manager
D.
Task Manager
Answers
Suggested answer: B

For the purpose of preserving the evidentiary chain of custody, which of the following labels is not appropriate?

A.
Relevant circumstances surrounding the collection
A.
Relevant circumstances surrounding the collection
Answers
B.
General description of the evidence
B.
General description of the evidence
Answers
C.
Exact location the evidence was collected from
C.
Exact location the evidence was collected from
Answers
D.
SSN of the person collecting the evidence
D.
SSN of the person collecting the evidence
Answers
Suggested answer: D

This is a statement, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted. Which among the following is suitable for the above statement?

A.
Testimony by the accused
A.
Testimony by the accused
Answers
B.
Limited admissibility
B.
Limited admissibility
Answers
C.
Hearsay rule
C.
Hearsay rule
Answers
D.
Rule 1001
D.
Rule 1001
Answers
Suggested answer: C

The information security manager at a national legal firm has received several alerts from the intrusion detection system that a known attack signature was detected against the organization's file server. What should the information security manager do first?

A.
Report the incident to senior management
A.
Report the incident to senior management
Answers
B.
Update the anti-virus definitions on the file server
B.
Update the anti-virus definitions on the file server
Answers
C.
Disconnect the file server from the network
C.
Disconnect the file server from the network
Answers
D.
Manually investigate to verify that an incident has occurred
D.
Manually investigate to verify that an incident has occurred
Answers
Suggested answer: C

Which of the following is the most effective tool for acquiring volatile data from a Windows-based system?

A.
Coreography
A.
Coreography
Answers
B.
Datagrab
B.
Datagrab
Answers
C.
Ethereal
C.
Ethereal
Answers
D.
Helix
D.
Helix
Answers
Suggested answer: D

Which of the following directory contains the binary files or executables required for system maintenance and administrative tasks on a Linux system?

A.
/sbin
A.
/sbin
Answers
B.
/bin
B.
/bin
Answers
C.
/usr
C.
/usr
Answers
D.
/lib
D.
/lib
Answers
Suggested answer: A

Which set of anti-forensic tools/techniques allows a program to compress and/or encrypt an executable file to hide attack tools from being detected by reverse-engineering or scanning?

A.
Packers
A.
Packers
Answers
B.
Emulators
B.
Emulators
Answers
C.
Password crackers
C.
Password crackers
Answers
D.
Botnets
D.
Botnets
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71