Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-49v10 Practice Exam with Questions & Answers | Set: 11

Questions 151

During an Investigation. Noel found a SIM card from the suspect's mobile. The ICCID on the card is

8944245252001451548.

What does the first four digits (89 and 44) In the ICCID represent?

Options:
A.

TAC and industry identifier

B.

Country code and industry identifier

C.

Industry identifier and country code

D.

Issuer identifier number and TAC

ECCouncil 312-49v10 Premium Access
Questions 152

A cybercriminal is attempting to remove evidence from a Windows computer. He deletes the file evldence1.doc. sending it to Windows Recycle Bin. The cybercriminal then empties the Recycle Bin. After having been removed from the Recycle Bin. what will happen to the data?

Options:
A.

The data will remain in its original clusters until it is overwritten

B.

The data will be moved to new clusters in unallocated space

C.

The data will become corrupted, making it unrecoverable

D.

The data will be overwritten with zeroes

Questions 153

Consider a scenario where a forensic investigator is performing malware analysis on a memory dump acquired from a victims computer. The investigator uses Volatility Framework to analyze RAM contents; which plugin helps investigator to identify hidden processes or injected code/DLL in the memory dump?

Options:
A.

pslist

B.

malscan

C.

mallist

D.

malfind

Questions 154

Frank, a cloud administrator in his company, needs to take backup of the OS disks of two Azure VMs that store business-critical data. Which type of Azure blob storage can he use for this purpose?

Options:
A.

Append blob

B.

Medium blob

C.

Block blob

D.

Page blob

Questions 155

John is working as a computer forensics investigator for a consulting firm in Canada. He is called to seize a computer at a local web caf purportedly used as a botnet server. John thoroughly scans the computer and finds nothing that would lead him to think the computer was a botnet server. John decides to scan the virtual memory of the computer to possibly find something he had missed. What information will the virtual memory scan produce?

Options:
A.

It contains the times and dates of when the system was last patched

B.

It is not necessary to scan the virtual memory of a computer

C.

It contains the times and dates of all the system files

D.

Hidden running processes

Questions 156

A computer forensics investigator is inspecting the firewall logs for a large financial institution that has employees working 24 hours a day, 7 days a week.

312-49v10 Question 156

What can the investigator infer from the screenshot seen below?

Options:
A.

A smurf attack has been attempted

B.

A denial of service has been attempted

C.

Network intrusion has occurred

D.

Buffer overflow attempt on the firewall.

Questions 157

Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?

Options:
A.

Microsoft Outlook

B.

Eudora

C.

Mozilla Thunderbird

D.

Microsoft Outlook Express

Questions 158

An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,536 bytes. What type of activity is the investigator seeing?

Options:
A.

Smurf

B.

Ping of death

C.

Fraggle

D.

Nmap scan

Questions 159

A master boot record (MBR) is the first sector (“sector zero”) of a data storage device. What is the size of MBR?

Options:
A.

Depends on the capacity of the storage device

B.

1048 Bytes

C.

4092 Bytes

D.

512 Bytes

Questions 160

When operating systems mark a cluster as used but not allocated, the cluster is considered as _________

Options:
A.

Corrupt

B.

Bad

C.

Lost

D.

Unallocated

Questions 161

Where is the default location for Apache access logs on a Linux computer?

Options:
A.

usr/local/apache/logs/access_log

B.

bin/local/home/apache/logs/access_log

C.

usr/logs/access_log

D.

logs/usr/apache/access_log

Questions 162

How many possible sequence number combinations are there in TCP/IP protocol?

Options:
A.

1 billion

B.

320 billion

C.

4 billion

D.

32 million

Questions 163

The process of restarting a computer that is already turned on through the operating system is called?

Options:
A.

Warm boot

B.

Ice boot

C.

Hot Boot

D.

Cold boot

Questions 164

Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?

Options:
A.

Shortcut Files

B.

Virtual files

C.

Prefetch Files

D.

Image Files

Questions 165

Smith, a forensic examiner, was analyzing a hard disk image to find and acquire deleted sensitive files. He stumbled upon a $Recycle.Bin folder in the root directory of the disk. Identify the operating system in use.

Options:
A.

Windows 98

B.

Linux

C.

Windows 8.1

D.

Windows XP