ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











How many sectors will a 125 KB file use in a FAT32 file system?

A.
32
A.
32
Answers
B.
16
B.
16
Answers
C.
256
C.
256
Answers
D.
25
D.
25
Answers
Suggested answer: C

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?

A.
70 years
A.
70 years
Answers
B.
the life of the author
B.
the life of the author
Answers
C.
the life of the author plus 70 years
C.
the life of the author plus 70 years
Answers
D.
copyrights last forever
D.
copyrights last forever
Answers
Suggested answer: C

When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?

A.
on the individual computer's ARP cache
A.
on the individual computer's ARP cache
Answers
B.
in the Web Server log files
B.
in the Web Server log files
Answers
C.
in the DHCP Server log files
C.
in the DHCP Server log files
Answers
D.
there is no way to determine the specific IP address
D.
there is no way to determine the specific IP address
Answers
Suggested answer: C

Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence.

The organization had used a Virtual Environment to trap Bob. What is a Virtual Environment?

A.
A Honeypot that traps hackers
A.
A Honeypot that traps hackers
Answers
B.
A system Using Trojaned commands
B.
A system Using Trojaned commands
Answers
C.
An environment set up after the user logs in
C.
An environment set up after the user logs in
Answers
D.
An environment set up before a user logs in
D.
An environment set up before a user logs in
Answers
Suggested answer: A

To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?

A.
Computer Forensics Tools and Validation Committee (CFTVC)
A.
Computer Forensics Tools and Validation Committee (CFTVC)
Answers
B.
Association of Computer Forensics Software Manufactures (ACFSM)
B.
Association of Computer Forensics Software Manufactures (ACFSM)
Answers
C.
National Institute of Standards and Technology (NIST)
C.
National Institute of Standards and Technology (NIST)
Answers
D.
Society for Valid Forensics Tools and Testing (SVFTT)
D.
Society for Valid Forensics Tools and Testing (SVFTT)
Answers
Suggested answer: C

With Regard to using an Antivirus scanner during a computer forensics investigation, You should:

A.
Scan the suspect hard drive before beginning an investigation
A.
Scan the suspect hard drive before beginning an investigation
Answers
B.
Never run a scan on your forensics workstation because it could change your systems configuration
B.
Never run a scan on your forensics workstation because it could change your systems configuration
Answers
C.
Scan your forensics workstation at intervals of no more than once every five minutes during an investigation
C.
Scan your forensics workstation at intervals of no more than once every five minutes during an investigation
Answers
D.
Scan your Forensics workstation before beginning an investigation
D.
Scan your Forensics workstation before beginning an investigation
Answers
Suggested answer: D

Windows identifies which application to open a file with by examining which of the following?

A.
The File extension
A.
The File extension
Answers
B.
The file attributes
B.
The file attributes
Answers
C.
The file Signature at the end of the file
C.
The file Signature at the end of the file
Answers
D.
The file signature at the beginning of the file
D.
The file signature at the beginning of the file
Answers
Suggested answer: A

You have used a newly released forensic investigation tool, which doesn't meet the Daubert Test, during a case. The case has ended-up in court. What argument could the defense make to weaken your case?

A.
The tool hasn't been tested by the International Standards Organization (ISO)
A.
The tool hasn't been tested by the International Standards Organization (ISO)
Answers
B.
Only the local law enforcement should use the tool
B.
Only the local law enforcement should use the tool
Answers
C.
The total has not been reviewed and accepted by your peers
C.
The total has not been reviewed and accepted by your peers
Answers
D.
You are not certified for using the tool
D.
You are not certified for using the tool
Answers
Suggested answer: C

Which of the following is NOT a graphics file?

A.
Picture1.tga
A.
Picture1.tga
Answers
B.
Picture2.bmp
B.
Picture2.bmp
Answers
C.
Picture3.nfo
C.
Picture3.nfo
Answers
D.
Picture4.psd
D.
Picture4.psd
Answers
Suggested answer: C

When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.

A.
Hard Drive Failure
A.
Hard Drive Failure
Answers
B.
Scope Creep
B.
Scope Creep
Answers
C.
Unauthorized expenses
C.
Unauthorized expenses
Answers
D.
Overzealous marketing
D.
Overzealous marketing
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71