ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 69

Add to Whishlist

List of questions

Question 681

Report Export Collapse

Which of the following tools is used to dump the memory of a running process, either immediately or when an error condition occurs?

Become a Premium Member for full access
  Unlock Premium Member

Question 682

Report Export Collapse

Frank, a cloud administrator in his company, needs to take backup of the OS disks of two Azure VMs that store business-critical dat a. Which type of Azure blob storage can he use for this purpose?

Become a Premium Member for full access
  Unlock Premium Member

Question 683

Report Export Collapse

Donald made an OS disk snapshot of a compromised Azure VM under a resource group being used by the affected company as a part of forensic analysis process. He then created a vhd file out of the snapshot and stored it in a file share and as a page blob as backup in a storage account under different region. What Is the next thing he should do as a security measure?

Become a Premium Member for full access
  Unlock Premium Member

Question 684

Report Export Collapse

What is the extension used by Windows OS for shortcut files present on the machine?

Become a Premium Member for full access
  Unlock Premium Member

Question 685

Report Export Collapse

Malware analysis can be conducted in various manners. An investigator gathers a suspicious executable file and uploads It to VirusTotal in order to confirm whether the file Is malicious, provide information about Its functionality, and provide Information that will allow to produce simple network signatures. What type of malware analysis was performed here?

Become a Premium Member for full access
  Unlock Premium Member

Question 686

Report Export Collapse

Simona has written a regular expression for the detection of web application-specific attack attempt that reads as /((\%3C)|)/lx. Which of the following does the part (|\%3E)|>) look for?

Become a Premium Member for full access
  Unlock Premium Member

Question 687

Report Export Collapse

Storage location of Recycle Bin for NTFS file systems (Windows Vista and later) is located at:

Become a Premium Member for full access
  Unlock Premium Member

Question 688

Report Export Collapse

Which "Standards and Criteria" under SWDGE states that "the agency must use hardware and software that are appropriate and effective for the seizure or examination procedure"?

Become a Premium Member for full access
  Unlock Premium Member

Question 689

Report Export Collapse

Which among the following acts has been passed by the U.S. Congress to protect investors from the possibility of fraudulent accounting activities by corporations?

Become a Premium Member for full access
  Unlock Premium Member

Question 690

Report Export Collapse

Steve received a mail that seemed to have come from her bank. The mail has instructions for Steve to click on a link and provide information to avoid the suspension of her account. The link in the mail redirected her to a form asking for details such as name, phone number, date of birth, credit card number or PIN, CW code, SNNs, and email address. On a closer look, Steve realized that the URL of the form in not the same as that of her bank's. Identify the type of external attack performed by the attacker In the above scenario?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions