ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

A.
Network Forensics
A.
Network Forensics
Answers
B.
Data Recovery
B.
Data Recovery
Answers
C.
Disaster Recovery
C.
Disaster Recovery
Answers
D.
Computer Forensics
D.
Computer Forensics
Answers
Suggested answer: D

When you carve an image, recovering the image depends on which of the following skills?

A.
Recognizing the pattern of the header content
A.
Recognizing the pattern of the header content
Answers
B.
Recovering the image from a tape backup
B.
Recovering the image from a tape backup
Answers
C.
Recognizing the pattern of a corrupt file
C.
Recognizing the pattern of a corrupt file
Answers
D.
Recovering the image from the tape backup
D.
Recovering the image from the tape backup
Answers
Suggested answer: A

When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts _______________ in the first letter position of the filename in the FAT database.

A.
A Capital X
A.
A Capital X
Answers
B.
A Blank Space
B.
A Blank Space
Answers
C.
The Underscore Symbol
C.
The Underscore Symbol
Answers
D.
The lowercase Greek Letter Sigma (s)
D.
The lowercase Greek Letter Sigma (s)
Answers
Suggested answer: D

While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?

A.
Keep the information of file for later review
A.
Keep the information of file for later review
Answers
B.
Destroy the evidence
B.
Destroy the evidence
Answers
C.
Bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge
C.
Bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge
Answers
D.
Present the evidence to the defense attorney
D.
Present the evidence to the defense attorney
Answers
Suggested answer: C

In Microsoft file structures, sectors are grouped together to form:

A.
Clusters
A.
Clusters
Answers
B.
Drives
B.
Drives
Answers
C.
Bitstreams
C.
Bitstreams
Answers
D.
Partitions
D.
Partitions
Answers
Suggested answer: A

What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?

A.
A compressed file
A.
A compressed file
Answers
B.
A Data stream file
B.
A Data stream file
Answers
C.
An encrypted file
C.
An encrypted file
Answers
D.
A reserved file
D.
A reserved file
Answers
Suggested answer: B

An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

A.
EFS uses a 128-bit key that can't be cracked, so you will not be able to recover the information
A.
EFS uses a 128-bit key that can't be cracked, so you will not be able to recover the information
Answers
B.
When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information.
B.
When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information.
Answers
C.
The EFS Revoked Key Agent can be used on the Computer to recover the information
C.
The EFS Revoked Key Agent can be used on the Computer to recover the information
Answers
D.
When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.
D.
When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.
Answers
Suggested answer: B

When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

A.
Recycle Bin
A.
Recycle Bin
Answers
B.
MSDOS.sys
B.
MSDOS.sys
Answers
C.
BIOS
C.
BIOS
Answers
D.
Case files
D.
Case files
Answers
Suggested answer: A

You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected. What are two common methods used by password cracking software that you can use to obtain the password?

A.
Limited force and library attack
A.
Limited force and library attack
Answers
B.
Brute Force and dictionary Attack
B.
Brute Force and dictionary Attack
Answers
C.
Maximum force and thesaurus Attack
C.
Maximum force and thesaurus Attack
Answers
D.
Minimum force and appendix Attack
D.
Minimum force and appendix Attack
Answers
Suggested answer: B

When reviewing web logs, you see an entry for resource not found in the HTTP status code filed.

What is the actual error code that you would see in the log for resource not found?

A.
202
A.
202
Answers
B.
404
B.
404
Answers
C.
505
C.
505
Answers
D.
909
D.
909
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71