ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 68

Question list
Search
Search

List of questions

Search

Related questions











Identify the location of Recycle Bin on a Windows 7 machine that uses NTFS file system to store and retrieve files on the hard disk.

A.
Drive:\$Recycle.Bin
A.
Drive:\$Recycle.Bin
Answers
B.
DriveARECYCLER
B.
DriveARECYCLER
Answers
C.
C:\RECYCLED
C.
C:\RECYCLED
Answers
D.
DriveARECYCLED
D.
DriveARECYCLED
Answers
Suggested answer: A

"No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court" - this principle Is advocated by which of the following?

A.
The Association of Chief Police Officers (ACPO) Principles of Digital Evidence
A.
The Association of Chief Police Officers (ACPO) Principles of Digital Evidence
Answers
B.
Locard's exchange principle
B.
Locard's exchange principle
Answers
C.
Scientific Working Group on Imaging Technology (SWGIT)
C.
Scientific Working Group on Imaging Technology (SWGIT)
Answers
D.
FBI Cyber Division
D.
FBI Cyber Division
Answers
Suggested answer: A

To which phase of the computer forensics investigation process does "planning and budgeting of a forensics lab" belong?

A.
Post-investigation phase
A.
Post-investigation phase
Answers
B.
Reporting phase
B.
Reporting phase
Answers
C.
Pre-investigation phase
C.
Pre-investigation phase
Answers
D.
Investigation phase
D.
Investigation phase
Answers
Suggested answer: C

Consider a scenario where a forensic investigator is performing malware analysis on a memory dump acquired from a victims computer. The investigator uses Volatility Framework to analyze RAM contents; which plugin helps investigator to identify hidden processes or injected code/DLL in the memory dump?

A.
pslist
A.
pslist
Answers
B.
malscan
B.
malscan
Answers
C.
mallist
C.
mallist
Answers
D.
malfind
D.
malfind
Answers
Suggested answer: D

Williamson is a forensic investigator. While investigating a case of data breach at a company, he is maintaining a document that records details such as the forensic processes applied on the collected evidence, particulars of people handling It. the dates and times when it Is being handled, and the place of storage of the evidence. What do you call this document?

A.
Consent form
A.
Consent form
Answers
B.
Log book
B.
Log book
Answers
C.
Authorization form
C.
Authorization form
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: D

An investigator Is examining a file to identify any potentially malicious content. To avoid code execution and still be able to uncover hidden indicators of compromise (IOC), which type of examination should the investigator perform:

A.
Threat hunting
A.
Threat hunting
Answers
B.
Threat analysis
B.
Threat analysis
Answers
C.
Static analysis
C.
Static analysis
Answers
D.
Dynamic analysis
D.
Dynamic analysis
Answers
Suggested answer: D

Matthew has been assigned the task of analyzing a suspicious MS Office document via static analysis over an Ubuntu-based forensic machine. He wants to see what type of document It Is. whether It Is encrypted, or contains any flash objects/VBA macros. Which of the following python-based script should he run to get relevant information?

A.
oleform.py
A.
oleform.py
Answers
B.
oleid.py
B.
oleid.py
Answers
C.
oledir.py
C.
oledir.py
Answers
D.
pdfid.py
D.
pdfid.py
Answers
Suggested answer: B

Cloud forensic investigations impose challenges related to multi-jurisdiction and multi-tenancy aspects. To have a better understanding of the roles and responsibilities between the cloud service provider (CSP) and the client, which document should the forensic investigator review?

A.
Service level agreement
A.
Service level agreement
Answers
B.
Service level management
B.
Service level management
Answers
C.
National and local regulation
C.
National and local regulation
Answers
D.
Key performance indicator
D.
Key performance indicator
Answers
Suggested answer: A

Mark works for a government agency as a cyber-forensic investigator. He has been given the task of restoring data from a hard drive. The partition of the hard drive was deleted by a disgruntled employee In order to hide their nefarious actions. What tool should Mark use to restore the data?

A.
EFSDump
A.
EFSDump
Answers
B.
Diskmon D
B.
Diskmon D
Answers
C.
iskvlew
C.
iskvlew
Answers
D.
R-Studio
D.
R-Studio
Answers
Suggested answer: D

A call detail record (CDR) provides metadata about calls made over a phone service. From the following data fields, which one Is not contained in a CDR.

A.
The call duration
A.
The call duration
Answers
B.
A unique sequence number identifying the record
B.
A unique sequence number identifying the record
Answers
C.
The language of the call
C.
The language of the call
Answers
D.
Phone number receiving the call
D.
Phone number receiving the call
Answers
Suggested answer: C
Total 704 questions
Go to page: of 71