Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-49v11 Practice Exam with Questions & Answers | Set: 10

Questions 91

During a forensic investigation into a suspected data breach, the eDiscovery team is tasked with collecting and preserving digital evidence from a compromised computer system. The team must deploy specialized tools to extract relevant data, such as emails, files, and system logs, from the machine. One team member is responsible for deploying these tools, configuring them for the specific needs of the investigation, and maintaining them throughout the entire data collection process. This individual ensures that the tools operate correctly and remain effective during the forensic analysis. Which of the following members of the eDiscovery team is responsible for this task?

Options:
A.

An eDiscovery attorney can support the deployment of essential tools for the eDiscovery team.

B.

Processing personnel can assist in the process of deploying the required tools for the eDiscovery team.

C.

Review personnel can aid in implementing the tools needed for the eDiscovery team.

D.

An eDiscovery software expert can help set up the necessary tools for the eDiscovery team.

ECCouncil 312-49v11 Premium Access
Questions 92

During a web-attack investigation at a retailer in Denver, analysts want to identify a step that explicitly acknowledges an attribution limitation even when gateway and server logs are available. Which methodology step states this constraint?

Options:
A.

Collect logs from the web server, application server, database server, WAF, local system events, SIEM tool, and IDS

B.

Analyze the working copies of collected logs to look for suspicious entries and correlate the data

C.

Trace the attacking IP to identify the perpetrator of the attack; this task is generally very difficult as attackers often use proxies and anonymizers to hide their identity

D.

Use encryption and checksum to verify and protect the integrity of log files

Questions 93

Emily, a system administrator, is tasked with automating the deployment of a custom service on a group of Windows servers in her organization. She has developed a script that will be used to add the new service to each server. The service will run a custom executable file that provides specific functionality for internal applications. To ensure that the service is created correctly, Emily needs to know which SrvMan command she should use to deploy the service to the system. Which of the following SrvMan commands should Emily use to create the new service?

Options:
A.

srvman.exe add [service name] [display name] [/type:] [/start:] [/interactive:no] [/overwrite:yes]

B.

srvman.exe delete

C.

srvman.exe stop [/nowait] [/delay:]

D.

srvman.exe run [service name] [/copy:yes] [/overwrite:no] [/stopafter:]

Questions 94

A company ' s network has been compromised by a malware attack that originated from a website seemingly offering a legitimate service. The user unknowingly visited the site, and after doing so, their system began exhibiting unusual behavior. The company discovered that the malware was executed as soon as the user visited the site, without any need for further interaction. Which technique is most likely responsible for this attack?

Options:
A.

Using spear-phishing sites to trigger the installation of malware in the target network.

B.

Distributing malware to the target network through malvertising.

C.

Leveraging black hat SEO techniques to implant malware in the target network.

D.

Installing malware on the target system via the drive by downloads method.

Questions 95

A digital forensics investigator is tasked with analyzing a compromised Mac computer recovered from a cybercrime scene. However, upon examination, the investigator discovers that the log messages containing crucial evidence have been tampered with or deleted.

Given the tampering or deletion of log messages on the Mac computer, which anti-forensic technique is likely employed to hinder the forensic analysis process in this scenario?

Options:
A.

Data encryption

B.

Data obfuscation

C.

Data hiding

D.

Data manipulation

Questions 96

In a workplace harassment investigation in Atlanta, a macOS user is suspected of sending threatening communications after business hours through the system ' s built-in messaging application. To recover stored chat content for timeline reconstruction and attribution analysis, where should the examiner look first for the relevant artifact?

Options:
A.

~/Library/Safari

B.

~/Library/Preferences

C.

~/Library/Messages

D.

/System/Library/CoreServices/SystemVersion.plist

Questions 97

As part of a corporate investigation, Melissa, a forensic investigator, has been tasked with examining the web browser history, cookies, and cache on a suspect ' s laptop. The laptop has multiple web browsers installed, including Google Chrome, Firefox, and Safari. Melissa needs a tool that can comprehensively extract and analyze these digital artifacts from multiple web browsers. Which tool should she use?

Options:
A.

NetAnalysis

B.

Sleuth Kit

C.

EnCase

D.

DiskExplorer

Questions 98

Investigators responding to a breach begin working directly at the scene. They assume control of relevant items on live systems and collect time-sensitive artifacts before any evidence is transferred for laboratory examination. Which scene assessment activity is being carried out at this stage?

Options:
A.

Take custody of exhibits and collect time-bound data

B.

Identify available exhibits at the scene

C.

Use a third party to extract evidence

D.

Process seized exhibits according to laboratory policy

Questions 99

After a recent security incident at a popular online retail store, an incident response team is conducting an investigation. They found that an attacker was able to make thousands of purchase attempts using different combinations of credit card information within just a few minutes. The team also discovered that the same IP address was responsible for all these transactions. As a computer hacking forensic investigator, what attack type are you most likely dealing with?

Options:
A.

Cookie Poisoning attack.

B.

Brute Force attack.

C.

Parameter Tampering attack.

D.

XML External Entity (XXE) attack.

Questions 100

A forensic investigator is examining a data breach at a corporate organization involving unauthorized access to sensitive files. During the investigation, she carefully identifies relevant data, collects it without modifying the original source, preserves its integrity, documents each step of the process, and prepares the findings for potential legal proceedings. What fundamental objective of computer forensics is being applied in this investigation?

Options:
A.

To estimate the potential impact caused by the incident on the victim and determine the intent of the perpetrator

B.

To protect the organization from similar incidents in the future

C.

To track and prosecute the perpetrators of a cyber crime

D.

To gather evidence of cyber crimes in a forensically sound manner