Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-49v10 Practice Exam with Questions & Answers | Set: 9

Questions 121

Which of the following statements is true with respect to SSDs (solid-state drives)?

Options:
A.

Like HDDs. SSDs also have moving parts

B.

SSDs cannot store non-volatile data

C.

SSDs contain tracks, clusters, and sectors to store data

D.

Faster data access, lower power usage, and higher reliability are some of the m

ECCouncil 312-49v10 Premium Access
Questions 122

A clothing company has recently deployed a website on Its latest product line to Increase Its conversion rate and base of customers. Andrew, the network administrator recently appointed by the company, has been assigned with the task of protecting the website from Intrusion and vulnerabilities. Which of the following tool should Andrew consider deploying in this scenario?

Options:
A.

ModSecurity

B.

CryptaPix

C.

Recuva

D.

Kon-Boot

Questions 123

Which set of anti-forensic tools/techniques allows a program to compress and/or encrypt an executable file to hide attack tools from being detected by reverse-engineering or scanning?

Options:
A.

Packers

B.

Emulators

C.

Password crackers

D.

Botnets

Questions 124

A forensic examiner encounters a computer with a failed OS installation and the master boot record (MBR) or partition sector damaged. Which of the following tools can find and restore files and Information In the disk?

Options:
A.

Helix

B.

R-Studio

C.

NetCat

D.

Wireshark

Questions 125

Which of the following directory contains the binary files or executables required for system maintenance and administrative tasks on a Linux system?

Options:
A.

/sbin

B.

/bin

C.

/usr

D.

/lib

Questions 126

An investigator Is examining a file to identify any potentially malicious content. To avoid code execution and still be able to uncover hidden indicators of compromise (IOC), which type of examination should the investigator perform:

Options:
A.

Threat hunting

B.

Threat analysis

C.

Static analysis

D.

Dynamic analysis

Questions 127

Fred, a cybercrime Investigator for the FBI, finished storing a solid-state drive In a static resistant bag and filled out the chain of custody form. Two days later. John grabbed the solid-state drive and created a clone of It (with write blockers enabled) In order to Investigate the drive. He did not document the chain of custody though. When John was finished, he put the solid-state drive back in the static resistant and placed it back in the evidence locker. A day later, the court trial began and upon presenting the evidence and the supporting documents, the chief Justice outright rejected them. Which of the following statements strongly support the reason for rejecting the evidence?

Options:
A.

Block clones cannot be created with solid-state drives

B.

Write blockers were used while cloning the evidence

C.

John did not document the chain of custody

D.

John investigated the clone instead of the original evidence itself

Questions 128

Assume there Is a file named myflle.txt In C: drive that contains hidden data streams. Which of the following commands would you Issue to display the contents of a data stream?

Options:
A.

echo text > program: source_file

B.

myfile.dat: st ream 1

C.

C:\MORE < myfile.txt:siream1

D.

C:\>ECHO text_message > myfile.txt:stream1

Questions 129

Mark works for a government agency as a cyber-forensic investigator. He has been given the task of restoring data from a hard drive. The partition of the hard drive was deleted by a disgruntled employee In order to hide their nefarious actions. What tool should Mark use to restore the data?

Options:
A.

EFSDump

B.

Diskmon D

C.

iskvlew

D.

R-Studio

Questions 130

What is the extension used by Windows OS for shortcut files present on the machine?

Options:
A.

.log

B.

.pf

C.

.lnk

D.

.dat

Questions 131

Williamson is a forensic investigator. While investigating a case of data breach at a company, he is maintaining a document that records details such as the forensic processes applied on the collected evidence, particulars of people handling It. the dates and times when it Is being handled, and the place of storage of the evidence. What do you call this document?

Options:
A.

Consent form

B.

Log book

C.

Authorization form

D.

Chain of custody

Questions 132

Which of the following tools will allow a forensic Investigator to acquire the memory dump of a suspect machine so that It may be Investigated on a forensic workstation to collect evidentiary data like processes and Tor browser artifacts?

Options:
A.

DB Browser SQLite

B.

Bulk Extractor

C.

Belkasoft Live RAM Capturer and AccessData FTK imager

D.

Hex Editor

Questions 133

Which of the following applications will allow a forensic investigator to track the user login sessions and user transactions that have occurred on an MS SQL Server?

Options:
A.

ApexSQL Audit

B.

netcat

C.

Notepad++

D.

Event Log Explorer

Questions 134

Data density of a disk drive is calculated by using_______

Options:
A.

Slack space, bit density, and slack density.

B.

Track space, bit area, and slack space.

C.

Track density, areal density, and slack density.

D.

Track density, areal density, and bit density.

Questions 135

"In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to explain his/her actions and the impact of those actions on the evidence, in the court." Which ACPO principle states this?

Options:
A.

Principle 1

B.

Principle 3

C.

Principle 4

D.

Principle 2