ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 50

List of questions

Question 491

Report
Export
Collapse

Centralized binary logging is a process in which many websites write binary and unformatted log data to a single log file. What extension should the investigator look to find its log file?

.cbl
.cbl
.log
.log
.ibl
.ibl
.txt
.txt
Suggested answer: C
asked 18/09/2024
Borja Arranz Palenzuela
38 questions

Question 492

Report
Export
Collapse

Where should the investigator look for the Edge browser's browsing records, including history, cache, and cookies?

ESE Database
ESE Database
Virtual Memory
Virtual Memory
Sparse files
Sparse files
Slack Space
Slack Space
Suggested answer: A
asked 18/09/2024
Moinuddin Mohammed
44 questions

Question 493

Report
Export
Collapse

Which of the following setups should a tester choose to analyze malware behavior?

A virtual system with internet connection
A virtual system with internet connection
A normal system without internet connect
A normal system without internet connect
A normal system with internet connection
A normal system with internet connection
A virtual system with network simulation for internet connection
A virtual system with network simulation for internet connection
Suggested answer: D
asked 18/09/2024
Mian Mudasir Bari
40 questions

Question 494

Report
Export
Collapse

A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?

/auth
/auth
/proc
/proc
/var/log/debug
/var/log/debug
/var/spool/cron/
/var/spool/cron/
Suggested answer: B
asked 18/09/2024
Dario Esposito
35 questions

Question 495

Report
Export
Collapse

What is the purpose of using Obfuscator in malware?

Execute malicious code in the system
Execute malicious code in the system
Avoid encryption while passing through a VPN
Avoid encryption while passing through a VPN
Avoid detection by security mechanisms
Avoid detection by security mechanisms
Propagate malware to other connected devices
Propagate malware to other connected devices
Suggested answer: C
asked 18/09/2024
Pavol Adamcin
35 questions

Question 496

Report
Export
Collapse

Which of the following commands shows you the username and IP address used to access the system via a remote login session and the type of client from which they are accessing the system?

Net config
Net config
Net sessions
Net sessions
Net share
Net share
Net stat
Net stat
Suggested answer: B
asked 18/09/2024
Yasser Mohamed Mohamed
45 questions

Question 497

Report
Export
Collapse

Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?

SOX
SOX
HIPAA 1996
HIPAA 1996
GLBA
GLBA
PCI DSS
PCI DSS
Suggested answer: C
asked 18/09/2024
Carola Lotito
41 questions

Question 498

Report
Export
Collapse

UEFI is a specification that defines a software interface between an OS and platform firmware.

Where does this interface store information about files present on a disk?

BIOS-MBR
BIOS-MBR
GUID Partition Table (GPT)
GUID Partition Table (GPT)
Master Boot Record (MBR)
Master Boot Record (MBR)
BIOS Parameter Block
BIOS Parameter Block
Suggested answer: B
asked 18/09/2024
marius trif
47 questions

Question 499

Report
Export
Collapse

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a "simple backup copy" of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a "simple backup copy" will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

Robust copy
Robust copy
Incremental backup copy
Incremental backup copy
Bit-stream copy
Bit-stream copy
Full backup copy
Full backup copy
Suggested answer: C
asked 18/09/2024
Ramon Pasay
40 questions

Question 500

Report
Export
Collapse

Which of the following network attacks refers to sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted so as to cause a denial-of-service attack?

Email spamming
Email spamming
Phishing
Phishing
Email spoofing
Email spoofing
Mail bombing
Mail bombing
Suggested answer: D
asked 18/09/2024
Hakan Köroğlu
34 questions
Total 704 questions
Go to page: of 71
Search

Related questions