Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-49v10 Practice Exam with Questions & Answers | Set: 4

Questions 46

Which of the following is a federal law enacted in the US to control the ways that financial institutions deal with the private information of individuals?

Options:
A.

SOX

B.

HIPAA 1996

C.

GLBA

D.

PCI DSS

ECCouncil 312-49v10 Premium Access
Questions 47

> NMAP -sn 192.168.11.200-215 The NMAP command above performs which of the following?

Options:
A.

A trace sweep

B.

A port scan

C.

A ping scan

D.

An operating system detect

Questions 48

Joshua is analyzing an MSSQL database for finding the attack evidence and other details, where should he look for the database logs?

Options:
A.

Model.log

B.

Model.txt

C.

Model.ldf

D.

Model.lgf

Questions 49

Which forensic investigation methodology believes that criminals commit crimes solely to benefit their criminal enterprises?

Options:
A.

Scientific Working Group on Digital Evidence

B.

Daubert Standard

C.

Enterprise Theory of Investigation

D.

Fyre Standard

Questions 50

What does the Rule 101 of Federal Rules of Evidence states?

Options:
A.

Scope of the Rules, where they can be applied

B.

Purpose of the Rules

C.

Limited Admissibility of the Evidence

D.

Rulings on Evidence

Questions 51

James is dealing with a case regarding a cybercrime that has taken place in Arizona, USA. James needs to lawfully seize the evidence from an electronic device without affecting the user's anonymity. Which of the following law should he comply with, before retrieving the evidence?

Options:
A.

First Amendment of the U.S. Constitution

B.

Fourth Amendment of the U.S. Constitution

C.

Third Amendment of the U.S. Constitution

D.

Fifth Amendment of the U.S. Constitution

Questions 52

As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?

Options:
A.

Status of users connected to the internet

B.

Net status of computer usage

C.

Information about network connections

D.

Status of network hardware

Questions 53

You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?

Options:
A.

Inverse TCP flag scanning

B.

ACK flag scanning

C.

TCP Scanning

D.

IP Fragment Scanning

Questions 54

James, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, James reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did James successfully execute?

Options:
A.

Cross Site Request Forgery

B.

Cookie Tampering

C.

Parameter Tampering

D.

Session Fixation Attack

Questions 55

In which implementation of RAID will the image of a Hardware RAID volume be different from the image taken separately from the disks?

Options:
A.

RAID 1

B.

The images will always be identical because data is mirrored for redundancy

C.

RAID 0

D.

It will always be different

Questions 56

Which of the following is NOT an anti-forensics technique?

Options:
A.

Data Deduplication

B.

Steganography

C.

Encryption

D.

Password Protection

Questions 57

An investigator is analyzing a checkpoint firewall log and comes across symbols. What type of log is he looking at?

312-49v10 Question 57

Options:
A.

Security event was monitored but not stopped

B.

Malicious URL detected

C.

An email marked as potential spam

D.

Connection rejected

Questions 58

Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?

Options:
A.

Server storage archives are the server information and settings stored on a local system, whereas the local archives are the local email client information stored on the mail server

B.

It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers

C.

Local archives should be stored together with the server storage archives in order to be admissible in a court of law

D.

Local archives do not have evidentiary value as the email client may alter the message data

Questions 59

Which list contains the most recent actions performed by a Windows User?

Options:
A.

MRU

B.

Activity

C.

Recents

D.

Windows Error Log

Questions 60

For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?

Options:
A.

Bypassing iPhone passcode

B.

Debugging iPhone

C.

Rooting iPhone

D.

Copying contents of iPhone