ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 69

Question list
Search
Search

List of questions

Search

Related questions











Which of the following tools is used to dump the memory of a running process, either immediately or when an error condition occurs?

A.
FATKit
A.
FATKit
Answers
B.
Coreography
B.
Coreography
Answers
C.
Belkasoft Live RAM Capturer
C.
Belkasoft Live RAM Capturer
Answers
D.
Cachelnf
D.
Cachelnf
Answers
Suggested answer: C

Frank, a cloud administrator in his company, needs to take backup of the OS disks of two Azure VMs that store business-critical dat a. Which type of Azure blob storage can he use for this purpose?

A.
Append blob
A.
Append blob
Answers
B.
Medium blob
B.
Medium blob
Answers
C.
Block blob
C.
Block blob
Answers
D.
Page blob
D.
Page blob
Answers
Suggested answer: D

Donald made an OS disk snapshot of a compromised Azure VM under a resource group being used by the affected company as a part of forensic analysis process. He then created a vhd file out of the snapshot and stored it in a file share and as a page blob as backup in a storage account under different region. What Is the next thing he should do as a security measure?

A.
Recommend changing the access policies followed by the company
A.
Recommend changing the access policies followed by the company
Answers
B.
Delete the snapshot from the source resource group
B.
Delete the snapshot from the source resource group
Answers
C.
Delete the OS disk of the affected VM altogether
C.
Delete the OS disk of the affected VM altogether
Answers
D.
Create another VM by using the snapshot
D.
Create another VM by using the snapshot
Answers
Suggested answer: B

What is the extension used by Windows OS for shortcut files present on the machine?

A.
.log
A.
.log
Answers
B.
.pf
B.
.pf
Answers
C.
.lnk
C.
.lnk
Answers
D.
.dat
D.
.dat
Answers
Suggested answer: C

Malware analysis can be conducted in various manners. An investigator gathers a suspicious executable file and uploads It to VirusTotal in order to confirm whether the file Is malicious, provide information about Its functionality, and provide Information that will allow to produce simple network signatures. What type of malware analysis was performed here?

A.
Static
A.
Static
Answers
B.
Volatile
B.
Volatile
Answers
C.
Dynamic
C.
Dynamic
Answers
D.
Hybrid
D.
Hybrid
Answers
Suggested answer: C

Simona has written a regular expression for the detection of web application-specific attack attempt that reads as /((\%3C)|)/lx. Which of the following does the part (|\%3E)|>) look for?

A.
Alphanumeric string or its hex equivalent
A.
Alphanumeric string or its hex equivalent
Answers
B.
Opening angle bracket or its hex equivalent
B.
Opening angle bracket or its hex equivalent
Answers
C.
Closing angle bracket or its hex equivalent
C.
Closing angle bracket or its hex equivalent
Answers
D.
Forward slash for a closing tag or its hex equivalent
D.
Forward slash for a closing tag or its hex equivalent
Answers
Suggested answer: C

Storage location of Recycle Bin for NTFS file systems (Windows Vista and later) is located at:

A.
Drive:\$ Recycle. Bin
A.
Drive:\$ Recycle. Bin
Answers
B.
DriveARECYClE.BIN
B.
DriveARECYClE.BIN
Answers
C.
Drive:\RECYCLER
C.
Drive:\RECYCLER
Answers
D.
Drive:\REYCLED
D.
Drive:\REYCLED
Answers
Suggested answer: C

Which "Standards and Criteria" under SWDGE states that "the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure"?

A.
Standards and Criteria 1.7
A.
Standards and Criteria 1.7
Answers
B.
Standards and Criteria 1.6
B.
Standards and Criteria 1.6
Answers
C.
Standards and Criteria 1.4
C.
Standards and Criteria 1.4
Answers
D.
Standards and Criteria 1.5
D.
Standards and Criteria 1.5
Answers
Suggested answer: D

Which among the following acts has been passed by the U.S. Congress to protect investors from the possibility of fraudulent accounting activities by corporations?

A.
Federal Information Security Management act of 2002
A.
Federal Information Security Management act of 2002
Answers
B.
Gramm-Leach-Bliley act
B.
Gramm-Leach-Bliley act
Answers
C.
Health insurance Probability and Accountability act of 1996
C.
Health insurance Probability and Accountability act of 1996
Answers
D.
Sarbanes-Oxley act of 2002
D.
Sarbanes-Oxley act of 2002
Answers
Suggested answer: D

Steve received a mail that seemed to have come from her bank. The mail has instructions for Steve to click on a link and provide information to avoid the suspension of her account. The link in the mail redirected her to a form asking for details such as name, phone number, date of birth, credit card number or PIN, CW code, SNNs, and email address. On a closer look, Steve realized that the URL of the form in not the same as that of her bank's. Identify the type of external attack performed by the attacker In the above scenario?

A.
Aphishing
A.
Aphishing
Answers
B.
Espionage
B.
Espionage
Answers
C.
Taiigating
C.
Taiigating
Answers
D.
Brute-force
D.
Brute-force
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71