ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 57

List of questions

Question 561

Report
Export
Collapse

In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?

Become a Premium Member for full access
  Unlock Premium Member

Question 562

Report
Export
Collapse

Which of these Windows utility help you to repair logical file system errors?

Become a Premium Member for full access
  Unlock Premium Member

Question 563

Report
Export
Collapse

Identify the term that refers to individuals who, by virtue of their knowledge and expertise, express an independent opinion on a matter related to a case based on the information that is provided.

Become a Premium Member for full access
  Unlock Premium Member

Question 564

Report
Export
Collapse

Steve, a forensic investigator, was asked to investigate an email incident in his organization. The organization has Microsoft Exchange Server deployed for email communications. Which among the following files will Steve check to analyze message headers, message text, and standard attachments?

Become a Premium Member for full access
  Unlock Premium Member

Question 565

Report
Export
Collapse

Which of the following information is displayed when Netstat is used with -ano switch?

Become a Premium Member for full access
  Unlock Premium Member

Question 566

Report
Export
Collapse

While collecting Active Transaction Logs using SQL Server Management Studio, the query Select * from ::fn_dblog(NULL, NULL) displays the active portion of the transaction log file. Here, assigning NULL values implies?

Become a Premium Member for full access
  Unlock Premium Member

Question 567

Report
Export
Collapse

Which of the following statements is TRUE with respect to the Registry settings in the user start-up folder HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\.

Become a Premium Member for full access
  Unlock Premium Member

Question 568

Report
Export
Collapse

Which cloud model allows an investigator to acquire the instance of a virtual machine and initiate the forensics examination process?

Become a Premium Member for full access
  Unlock Premium Member

Question 569

Report
Export
Collapse

An attacker successfully gained access to a remote Windows system and plans to install persistent backdoors on it. Before that, to avoid getting detected in future, he wants to cover his tracks by disabling the last-accessed timestamps of the machine. What would he do to achieve this?

Become a Premium Member for full access
  Unlock Premium Member

Question 570

Report
Export
Collapse

Which of the following web browser uses the Extensible Storage Engine (ESE) database format to store browsing records, including history, cache, and cookies?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions