Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-49v10 Practice Exam with Questions & Answers | Set: 3

Questions 31

Adam, a forensic analyst, is preparing VMs for analyzing a malware. Which of the following is NOT a best practice?

Options:
A.

Isolating the host device

B.

Installing malware analysis tools

C.

Using network simulation tools

D.

Enabling shared folders

ECCouncil 312-49v10 Premium Access
Questions 32

Which U.S. law sets the rules for sending emails for commercial purposes, establishes the minimum requirements for commercial messaging, gives the recipients of emails the right to ask the senders to stop emailing them, and spells out the penalties in case the above said rules are violated?

Options:
A.

NO-SPAM Act

B.

American: NAVSO P-5239-26 (RLL)

C.

CAN-SPAM Act

D.

American: DoD 5220.22-M

Questions 33

Which of the following is a device monitoring tool?

Options:
A.

Capsa

B.

Driver Detective

C.

Regshot

D.

RAM Capturer

Questions 34

Jacob is a computer forensics investigator with over 10 years of experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob’s testimony in this case?

Options:
A.

Certification

B.

Justification

C.

Reiteration

D.

Authentication

Questions 35

Graphics Interchange Format (GIF) is a ____ RGB bitmap image format for images with up to 256 distinct colors per frame.

Options:
A.

8-bit

B.

32-bit

C.

16-bit

D.

24-bit

Questions 36

You are assigned a task to examine the log files pertaining to MyISAM storage engine. While examining, you are asked to perform a recovery operation on a MyISAM log file. Which among the following MySQL Utilities allow you to do so?

Options:
A.

mysqldump

B.

myisamaccess

C.

myisamlog

D.

myisamchk

Questions 37

If the partition size is 4 GB, each cluster will be 32 K. Even if a file needs only 10 K, the entire 32 K will be allocated, resulting in 22 K of ________.

Options:
A.

Slack space

B.

Deleted space

C.

Sector space

D.

Cluster space

Questions 38

An investigator has acquired packed software and needed to analyze it for the presence of malice. Which of the following tools can help in finding the packaging software used?

Options:
A.

SysAnalyzer

B.

PEiD

C.

Comodo Programs Manager

D.

Dependency Walker

Questions 39

UEFI is a specification that defines a software interface between an OS and platform firmware. Where does this interface store information about files present on a disk?

Options:
A.

BIOS-MBR

B.

GUID Partition Table (GPT)

C.

Master Boot Record (MBR)

D.

BIOS Parameter Block

Questions 40

Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?

Options:
A.

Directory Table

B.

Rainbow Table

C.

Master file Table (MFT)

D.

Partition Table

Questions 41

An investigator has extracted the device descriptor for a 1GB thumb drive that looks like: Disk&Ven_Best_Buy&Prod_Geek_Squad_U3&Rev_6.15. What does the “Geek_Squad” part represent?

Options:
A.

Product description

B.

Manufacturer Details

C.

Developer description

D.

Software or OS used

Questions 42

Which of these Windows utility help you to repair logical file system errors?

Options:
A.

Resource Monitor

B.

Disk cleanup

C.

Disk defragmenter

D.

CHKDSK

Questions 43

Which of the following registry hive gives the configuration information about which application was used to open various files on the system?

Options:
A.

HKEY_CLASSES_ROOT

B.

HKEY_CURRENT_CONFIG

C.

HKEY_LOCAL_MACHINE

D.

HKEY_USERS

Questions 44

Identify the file system that uses $BitMap file to keep track of all used and unused clusters on a volume.

Options:
A.

NTFS

B.

FAT

C.

EXT

D.

FAT32

Questions 45

Select the data that a virtual memory would store in a Windows-based system.

Options:
A.

Information or metadata of the files

B.

Documents and other files

C.

Application data

D.

Running processes