ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 70

Add to Whishlist

List of questions

Question 691

Report Export Collapse

According to RFC 3227, which of the following is considered as the most volatile item on a typical system?

Become a Premium Member for full access
  Unlock Premium Member

Question 692

Report Export Collapse

An investigator seized a notebook device installed with a Microsoft Windows OS. Which type of files would support an investigation of the data size and structure in the device?

Become a Premium Member for full access
  Unlock Premium Member

Question 693

Report Export Collapse

Which of the following Windows event logs record events related to device drives and hardware changes?

Become a Premium Member for full access
  Unlock Premium Member

Question 694

Report Export Collapse

You are a forensic investigator who is analyzing a hard drive that was recently collected as evidence.

You have been unsuccessful at locating any meaningful evidence within the file system and suspect a drive wiping utility may have been used. You have reviewed the keys within the software hive of the Windows registry and did not find any drive wiping utilities. How can you verify that drive wiping software was used on the hard drive?

Become a Premium Member for full access
  Unlock Premium Member

Question 695

Report Export Collapse

Which of the following malware targets Android mobile devices and installs a backdoor that remotely installs applications from an attacker-controlled server?

Become a Premium Member for full access
  Unlock Premium Member

Question 696

Report Export Collapse

In which loT attack does the attacker use multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?

Become a Premium Member for full access
  Unlock Premium Member

Question 697

Report Export Collapse

Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and hopefully solve the case. She is using a lookup table used for recovering a plain text password from cipher text; it contains word list and brute-force list along with their computed hash values. Chloe Is also using a graphical generator that supports SHA1. a. What password technique is being used? b. What tool is Chloe using?

Become a Premium Member for full access
  Unlock Premium Member

Question 698

Report Export Collapse

Jacob, a cybercrime investigator, joined a forensics team to participate in a criminal case involving digital evidence. After the investigator collected all the evidence and presents it to the court, the judge dropped the case and the defense attorney pressed charges against Jacob and the rest of the forensics team for unlawful search and seizure. What forensics privacy issue was not addressed prior to collecting the evidence?

Become a Premium Member for full access
  Unlock Premium Member

Question 699

Report Export Collapse

Which of the following applications will allow a forensic investigator to track the user login sessions and user transactions that have occurred on an MS SQL Server?

Become a Premium Member for full access
  Unlock Premium Member

Question 700

Report Export Collapse

Which layer in the loT architecture is comprised of hardware parts such as sensors, RFID tags, and devices that play an important role in data collection?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions