ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 71

Question list
Search
Search

Related questions











Robert needs to copy an OS disk snapshot of a compromised VM to a storage account in different region for further investigation. Which of the following should he use in this scenario?

A.
Azure CLI
A.
Azure CLI
Answers
B.
Azure Monitor
B.
Azure Monitor
Answers
C.
Azure Active Directory
C.
Azure Active Directory
Answers
D.
Azure Portal
D.
Azure Portal
Answers
Suggested answer: D

Which of the following is a requirement for senders as per the CAN-SPAM act?

A.
Senders cannot use misleading or false header information
A.
Senders cannot use misleading or false header information
Answers
B.
Senders should never share their physical postal address in the email
B.
Senders should never share their physical postal address in the email
Answers
C.
Senders must use deceptive subject lines
C.
Senders must use deceptive subject lines
Answers
D.
Emails must not contain information regarding how to stop receiving emails from the sender in future
D.
Emails must not contain information regarding how to stop receiving emails from the sender in future
Answers
Suggested answer: A

Before accessing digital evidence from victims, witnesses, or suspects, on their electronic devices, what should the Investigator do first to respect legal privacy requirements?

A.
Notify the fact to the local authority or employer
A.
Notify the fact to the local authority or employer
Answers
B.
Remove the battery or turn-off the device
B.
Remove the battery or turn-off the device
Answers
C.
Protect the device against external communication
C.
Protect the device against external communication
Answers
D.
Obtain formal written consent to search
D.
Obtain formal written consent to search
Answers
Suggested answer: A

You are the incident response manager at a regional bank. While performing routine auditing of web application logs, you find several attempted login submissions that contain the following strings:

What kind of attack has occurred?

A.
SQL injection
A.
SQL injection
Answers
B.
Buffer overflow
B.
Buffer overflow
Answers
C.
Cross-size scripting
C.
Cross-size scripting
Answers
D.
Cross-size request forgery
D.
Cross-size request forgery
Answers
Suggested answer: C

Explanation:


Total 704 questions
Go to page: of 71