Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-49v10 Practice Exam with Questions & Answers | Set: 10

Questions 136

This law sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.

Options:
A.

The CAN-SPAM act

B.

Federal Spam act

C.

Telemarketing act

D.

European Anti-Spam act

ECCouncil 312-49v10 Premium Access
Questions 137

A breach resulted from a malware attack that evaded detection and compromised the machine memory without installing any software or accessing the hard drive. What technique did the adversaries use to deliver the attack?

Options:
A.

Fileless

B.

Trojan

C.

JavaScript

D.

Spyware

Questions 138

Sally accessed the computer system that holds trade secrets of the company where she Is employed. She knows she accessed It without authorization and all access (authorized and unauthorized) to this computer Is monitored.To cover her tracks. Sally deleted the log entries on this computer. What among the following best describes her action?

Options:
A.

Password sniffing

B.

Anti-forensics

C.

Brute-force attack

D.

Network intrusion

Questions 139

In Java, when multiple applications are launched, multiple Dalvik Virtual Machine instances occur that consume memory and time. To avoid that. Android Implements a process that enables low memory consumption and quick start-up time. What is the process called?

Options:
A.

init

B.

Media server

C.

Zygote

D.

Daemon

Questions 140

Harry has collected a suspicious executable file from an infected system and seeks to reverse its machine code to Instructions written in assembly language. Which tool should he use for this purpose?

Options:
A.

Ollydbg

B.

oledump

C.

HashCalc

D.

BinText

Questions 141

Which of the following statements pertaining to First Response is true?

Options:
A.

First Response is a part of the investigation phase

B.

First Response is a part of the post-investigation phase

C.

First Response is a part of the pre-investigation phase

D.

First Response is neither a part of pre-investigation phase nor a part of investigation phase. It only involves attending to a crime scene first and taking measures that assist forensic investigators in executing their tasks in the investigation phase more efficiently

Questions 142

Matthew has been assigned the task of analyzing a suspicious MS Office document via static analysis over an Ubuntu-based forensic machine. He wants to see what type of document It Is. whether It Is encrypted, or contains any flash objects/VBA macros. Which of the following python-based script should he run to get relevant information?

Options:
A.

oleform.py

B.

oleid.py

C.

oledir.py

D.

pdfid.py

Questions 143

Before accessing digital evidence from victims, witnesses, or suspects, on their electronic devices, what should the Investigator do first to respect legal privacy requirements?

Options:
A.

Notify the fact to the local authority or employer

B.

Remove the battery or turn-off the device

C.

Protect the device against external communication

D.

Obtain formal written consent to search

Questions 144

Which following forensic tool allows investigator to detect and extract hidden streams on NTFS drive?

Options:
A.

Stream Detector

B.

TimeStomp

C.

Autopsy

D.

analyzeMFT

Questions 145

According to RFC 3227, which of the following is considered as the most volatile item on a typical system?

Options:
A.

Registers and cache

B.

Temporary system files

C.

Archival media

D.

Kernel statistics and memory

Questions 146

An investigator wants to extract passwords from SAM and System Files. Which tool can the Investigator use to obtain a list of users, passwords, and their hashes In this case?

Options:
A.

PWdump7

B.

HashKey

C.

Nuix

D.

FileMerlin

Questions 147

An Investigator Is checking a Cisco firewall log that reads as follows:

Aug 21 2019 09:16:44: %ASA-1-106021: Deny ICMP reverse path check from 10.0.0.44 to 10.0.0.33 on Interface outside

What does %ASA-1-106021 denote?

Options:
A.

Mnemonic message

B.

Type of traffic

C.

Firewall action

D.

Type of request

Questions 148

You are the incident response manager at a regional bank. While performing routine auditing of web application logs, you find several attempted login submissions that contain the following strings:

312-49v10 Question 148

What kind of attack has occurred?

Options:
A.

SQL injection

B.

Buffer overflow

C.

Cross-size scripting

D.

Cross-size request forgery

Questions 149

Edgar is part of the FBI's forensic media and malware analysis team; he Is analyzing a current malware and Is conducting a thorough examination of the suspect system, network, and other connected devices. Edgar's approach Is to execute the malware code to know how It Interacts with the host system and Its Impacts on It. He is also using a virtual machine and a sandbox environment.

What type of malware analysis is Edgar performing?

Options:
A.

Malware disassembly

B.

VirusTotal analysis

C.

Static analysis

D.

Dynamic malware analysis/behavioral analysis

Questions 150

Which Federal Rule of Evidence speaks about the Hearsay exception where the availability of the declarant Is immaterial and certain characteristics of the declarant such as present sense Impression, excited utterance, and recorded recollection are also observed while giving their testimony?

Options:
A.

Rule 801

B.

Rule 802

C.

Rule 804

D.

Rule 803