Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-49v10 Practice Exam with Questions & Answers | Set: 14

Questions 196

Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?

Options:
A.

Dictionary attack

B.

Brute force attack

C.

Rule-based attack

D.

Man in the middle attack

ECCouncil 312-49v10 Premium Access
Questions 197

On an Active Directory network using NTLM authentication, where on the domain controllers are the passwords stored?

Options:
A.

SAM

B.

AMS

C.

Shadow file

D.

Password.conf

Questions 198

What layer of the OSI model do TCP and UDP utilize?

Options:
A.

Data Link

B.

Network

C.

Transport

D.

Session

Questions 199

Paraben Lockdown device uses which operating system to write hard drive data?

Options:
A.

Mac OS

B.

Red Hat

C.

Unix

D.

Windows

Questions 200

Jacky encrypts her documents using a password. It is known that she uses her daughter’s year of birth as part of the password. Which password cracking technique would be optimal to crack her password?

Options:
A.

Rule-based attack

B.

Brute force attack

C.

Syllable attack

D.

Hybrid attack

Questions 201

How many times can data be written to a DVD+R disk?

Options:
A.

Twice

B.

Once

C.

Zero

D.

Infinite

Questions 202

Which of the following is a record of the characteristics of a file system, including its size, the block size, the empty and the filled blocks and their respective counts, the size and location of the inode tables, the disk block map and usage information, and the size of the block groups?

Options:
A.

Inode bitmap block

B.

Superblock

C.

Block bitmap block

D.

Data block

Questions 203

Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:

Options:
A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProfileList

C.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\RegList

D.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Regedit

Questions 204

Jacob is a computer forensics investigator with over 10 years experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob testimony in this case?

Options:
A.

Justification

B.

Authentication

C.

Reiteration

D.

Certification

Questions 205

What is the smallest physical storage unit on a hard drive?

Options:
A.

Track

B.

Cluster

C.

Sector

D.

Platter

Questions 206

When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?

Options:
A.

All virtual memory will be deleted

B.

The wrong partition may be set to active

C.

This action can corrupt the disk

D.

The computer will be set in a constant reboot state

Questions 207

How often must a company keep log files for them to be admissible in a court of law?

Options:
A.

All log files are admissible in court no matter their frequency

B.

Weekly

C.

Monthly

D.

Continuously

Questions 208

Which of the following Perl scripts will help an investigator to access the executable image of a process?

Options:
A.

Lspd.pl

B.

Lpsi.pl

C.

Lspm.pl

D.

Lspi.pl

Questions 209

Which of the following statements is incorrect when preserving digital evidence?

Options:
A.

Verify if the monitor is in on, off, or in sleep mode

B.

Turn on the computer and extract Windows event viewer log files

C.

Remove the plug from the power router or modem

D.

Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals

Questions 210

What value of the "Boot Record Signature" is used to indicate that the boot-loader exists?

Options:
A.

AA55

B.

00AA

C.

AA00

D.

A100