ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 67

List of questions

Question 661

Report Export Collapse

You are an information security analyst at a large pharmaceutical company. While performing a routine review of audit logs, you have noticed a significant amount of egress traffic to various IP addresses on destination port 22 during off- peak hours. You researched some of the IP addresses and found that many of them are in Eastern Europe. What is the most likely cause of this traffic?

Become a Premium Member for full access
  Unlock Premium Member

Question 662

Report Export Collapse

Choose the layer in iOS architecture that provides frameworks for iOS app development?

Become a Premium Member for full access
  Unlock Premium Member

Question 663

Report Export Collapse

Data density of a disk drive is calculated by using_______

Become a Premium Member for full access
  Unlock Premium Member

Question 664

Report Export Collapse

Web browsers can store relevant information from user activities. Forensic investigators may retrieve files, lists, access history, cookies, among other digital footprints. Which tool can contribute to this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 665

Report Export Collapse

For the purpose of preserving the evidentiary chain of custody, which of the following labels is not appropriate?

Become a Premium Member for full access
  Unlock Premium Member

Question 666

Report Export Collapse

This is a statement, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted. Which among the following is suitable for the above statement?

Become a Premium Member for full access
  Unlock Premium Member

Question 667

Report Export Collapse

The information security manager at a national legal firm has received several alerts from the intrusion detection system that a known attack signature was detected against the organization's file server. What should the information security manager do first?

Become a Premium Member for full access
  Unlock Premium Member

Question 668

Report Export Collapse

Which of the following is the most effective tool for acquiring volatile data from a Windows-based system?

Become a Premium Member for full access
  Unlock Premium Member

Question 669

Report Export Collapse

Which of the following directory contains the binary files or executables required for system maintenance and administrative tasks on a Linux system?

Become a Premium Member for full access
  Unlock Premium Member

Question 670

Report Export Collapse

Which set of anti-forensic tools/techniques allows a program to compress and/or encrypt an executable file to hide attack tools from being detected by reverse-engineering or scanning?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions