ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 70

Question list
Search
Search

List of questions

Search

Related questions











According to RFC 3227, which of the following is considered as the most volatile item on a typical system?

A.
Registers and cache
A.
Registers and cache
Answers
B.
Temporary system files
B.
Temporary system files
Answers
C.
Archival media
C.
Archival media
Answers
D.
Kernel statistics and memory
D.
Kernel statistics and memory
Answers
Suggested answer: A

An investigator seized a notebook device installed with a Microsoft Windows OS. Which type of files would support an investigation of the data size and structure in the device?

A.
Ext2 and Ext4
A.
Ext2 and Ext4
Answers
B.
APFSandHFS
B.
APFSandHFS
Answers
C.
HFS and GNUC
C.
HFS and GNUC
Answers
D.
NTFSandFAT
D.
NTFSandFAT
Answers
Suggested answer: D

Which of the following Windows event logs record events related to device drives and hardware changes?

A.
Forwarded events log
A.
Forwarded events log
Answers
B.
System log
B.
System log
Answers
C.
Application log
C.
Application log
Answers
D.
Security log
D.
Security log
Answers
Suggested answer: B

You are a forensic investigator who is analyzing a hard drive that was recently collected as evidence.

You have been unsuccessful at locating any meaningful evidence within the file system and suspect a drive wiping utility may have been used. You have reviewed the keys within the software hive of the Windows registry and did not find any drive wiping utilities. How can you verify that drive wiping software was used on the hard drive?

A.
Document in your report that you suspect a drive wiping utility was used, but no evidence was found
A.
Document in your report that you suspect a drive wiping utility was used, but no evidence was found
Answers
B.
Check the list of installed programs
B.
Check the list of installed programs
Answers
C.
Load various drive wiping utilities offline, and export previous run reports
C.
Load various drive wiping utilities offline, and export previous run reports
Answers
D.
Look for distinct repeating patterns on the hard drive at the bit level
D.
Look for distinct repeating patterns on the hard drive at the bit level
Answers
Suggested answer: D

Which of the following malware targets Android mobile devices and installs a backdoor that remotely installs applications from an attacker-controlled server?

A.
Felix
A.
Felix
Answers
B.
XcodeGhost
B.
XcodeGhost
Answers
C.
xHelper
C.
xHelper
Answers
D.
Unflod
D.
Unflod
Answers
Suggested answer: D

In which loT attack does the attacker use multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?

A.
Replay attack
A.
Replay attack
Answers
B.
Jamming attack
B.
Jamming attack
Answers
C.
Blueborne attack
C.
Blueborne attack
Answers
D.
Sybil attack
D.
Sybil attack
Answers
Suggested answer: D

Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and hopefully solve the case. She is using a lookup table used for recovering a plain text password from cipher text; it contains word list and brute-force list along with their computed hash values. Chloe Is also using a graphical generator that supports SHA1. a. What password technique is being used? b. What tool is Chloe using?

A.
Dictionary attack b. Cisco PIX
A.
Dictionary attack b. Cisco PIX
Answers
B.
Cain & Able b. Rten
B.
Cain & Able b. Rten
Answers
C.
Brute-force b. MScache
C.
Brute-force b. MScache
Answers
D.
Rainbow Tables b. Winrtgen
D.
Rainbow Tables b. Winrtgen
Answers
Suggested answer: D

Jacob, a cybercrime investigator, joined a forensics team to participate in a criminal case involving digital evidence. After the investigator collected all the evidence and presents it to the court, the judge dropped the case and the defense attorney pressed charges against Jacob and the rest of the forensics team for unlawful search and seizure. What forensics privacy issue was not addressed prior to collecting the evidence?

A.
Compliance with the Second Amendment of the U.S. Constitution
A.
Compliance with the Second Amendment of the U.S. Constitution
Answers
B.
Compliance with the Third Amendment of the U.S. Constitution
B.
Compliance with the Third Amendment of the U.S. Constitution
Answers
C.
None of these
C.
None of these
Answers
D.
Compliance with the Fourth Amendment of the U.S. Constitution
D.
Compliance with the Fourth Amendment of the U.S. Constitution
Answers
Suggested answer: D

Which of the following applications will allow a forensic investigator to track the user login sessions and user transactions that have occurred on an MS SQL Server?

A.
ApexSQL Audit
A.
ApexSQL Audit
Answers
B.
netcat
B.
netcat
Answers
C.
Notepad++
C.
Notepad++
Answers
D.
Event Log Explorer
D.
Event Log Explorer
Answers
Suggested answer: A

Which layer in the loT architecture is comprised of hardware parts such as sensors, RFID tags, and devices that play an important role in data collection?

A.
Middleware layer
A.
Middleware layer
Answers
B.
Edge technology layer
B.
Edge technology layer
Answers
C.
Application layer
C.
Application layer
Answers
D.
Access gateway layer
D.
Access gateway layer
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71