ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 68

List of questions

Question 671

Report Export Collapse

Identify the location of Recycle Bin on a Windows 7 machine that uses NTFS file system to store and retrieve files on the hard disk.

Become a Premium Member for full access
  Unlock Premium Member

Question 672

Report Export Collapse

"No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court" - this principle Is advocated by which of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 673

Report Export Collapse

To which phase of the computer forensics investigation process does "planning and budgeting of a forensics lab" belong?

Become a Premium Member for full access
  Unlock Premium Member

Question 674

Report Export Collapse

Consider a scenario where a forensic investigator is performing malware analysis on a memory dump acquired from a victims computer. The investigator uses Volatility Framework to analyze RAM contents; which plugin helps investigator to identify hidden processes or injected code/DLL in the memory dump?

Become a Premium Member for full access
  Unlock Premium Member

Question 675

Report Export Collapse

Williamson is a forensic investigator. While investigating a case of data breach at a company, he is maintaining a document that records details such as the forensic processes applied on the collected evidence, particulars of people handling It. the dates and times when it Is being handled, and the place of storage of the evidence. What do you call this document?

Become a Premium Member for full access
  Unlock Premium Member

Question 676

Report Export Collapse

An investigator Is examining a file to identify any potentially malicious content. To avoid code execution and still be able to uncover hidden indicators of compromise (IOC), which type of examination should the investigator perform:

Become a Premium Member for full access
  Unlock Premium Member

Question 677

Report Export Collapse

Matthew has been assigned the task of analyzing a suspicious MS Office document via static analysis over an Ubuntu-based forensic machine. He wants to see what type of document It Is. whether It Is encrypted, or contains any flash objects/VBA macros. Which of the following python-based script should he run to get relevant information?

Become a Premium Member for full access
  Unlock Premium Member

Question 678

Report Export Collapse

Cloud forensic investigations impose challenges related to multi-jurisdiction and multi-tenancy aspects. To have a better understanding of the roles and responsibilities between the cloud service provider (CSP) and the client, which document should the forensic investigator review?

Become a Premium Member for full access
  Unlock Premium Member

Question 679

Report Export Collapse

Mark works for a government agency as a cyber-forensic investigator. He has been given the task of restoring data from a hard drive. The partition of the hard drive was deleted by a disgruntled employee In order to hide their nefarious actions. What tool should Mark use to restore the data?

Become a Premium Member for full access
  Unlock Premium Member

Question 680

Report Export Collapse

A call detail record (CDR) provides metadata about calls made over a phone service. From the following data fields, which one Is not contained in a CDR.

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions