Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-49v11 Practice Exam with Questions & Answers | Set: 12

Questions 111

As a malware analyst, you ' re tasked with scrutinizing a suspicious program on a Windows workstation, particularly focusing on its interactions with system registry files. Monitoring registry artifacts provides insights into malware behavior, aiding in identifying persistence mechanisms and malicious activities. How do forensic investigators gain insights into malware behavior on Windows systems by monitoring registry artifacts?

Options:
A.

Monitoring network traffic patterns

B.

Reviewing browser history logs

C.

Tracking system file executions

D.

Analyzing registry key modifications

ECCouncil 312-49v11 Premium Access
Questions 112

During a malware incident response at a technology firm in Seattle, the forensic team must capture volatile data from a suspect Windows workstation while the system remains powered on. The acquisition must preserve running processes and in-memory artifacts such as encryption keys and system state. Which tool is most appropriate for this type of volatile data acquisition?

Options:
A.

LiME

B.

dd command

C.

Belkasoft Live RAM Capturer

D.

Fmem

Questions 113

Camila, a forensic investigator, is working on a Linux machine that has been suspected of running malicious software. She wants to analyze the interactions between the running processes and the kernel, as these interactions could provide important clues about the behavior of the malware. To track the system calls made by the processes, she decides to use a tool that can intercept and record these system calls in real-time. Which tool should Camila use to monitor the system calls generated by processes on the system?

Options:
A.

strace

B.

Wireshark

C.

tcpdump

D.

Process Explorer

Questions 114

Laura, a CHFI certified investigator, has been brought in to investigate a major incident at a software development company. A disgruntled employee had injected malicious code into several core products, causing significant damage to the company ' s reputation and bottom line. Laura had to decide the best way to gather evidence from the suspect ' s heavily used workstation, which has been running continuously for weeks and may contain critical evidence in RAM. What data acquisition strategy should Laura adopt to maximize the evidence gathered?

Options:
A.

Dead acquisition after shutting down the workstation.

B.

Copying key files to an external storage device.

C.

Remote acquisition over the network.

D.

Live acquisition from the running workstation.

Questions 115

You ' re a digital forensic analyst tasked with analyzing a Portable Document Format (PDF) file to extract information about its structure and contents. Understanding the PDF file structure is essential for conducting a thorough analysis. What is the component of a PDF file that enables random access to objects, includes links to all objects within the file, and aids in tracking updates made to the PDF file?

Options:
A.

Header

B.

Cross-reference table (xref table)

C.

Body

D.

Footer

Questions 116

During a robbery investigation in Phoenix, Arizona, detectives obtain carrier records to associate a seized handset with account-level activity observed around multiple towers near the crime scene. The team needs the field that identifies the subscriber in the provider ' s records rather than the handset hardware or the dialable number to correlate movements with the account. Which field should they prioritize?

Options:
A.

MSISDN

B.

Cell ID

C.

IMEI

D.

IMSI

Questions 117

Following a cyberattack at a financial institution in Chicago, Illinois, investigators are overwhelmed by repeated alerts and duplicate log entries generated across several monitoring platforms. Before attempting correlation, the team applies a step intended to reduce noise and improve analytical efficiency. What action does this step represent?

Options:
A.

Compress data, delete repeated entries, or filter

B.

Gather logs from multiple sources into a centralized system

C.

Encrypt and authenticate data during collection

D.

Format data from different log types into a single log format

Questions 118

A forensic investigator is assigned to a cybercrime investigation where they need to document critical evidence from a powered-on computer located at the crime scene. The computer is suspected to contain important files or programs that are part of the ongoing investigation, upon arriving at the scene, the investigator observes that the monitor of the computer is displaying a screensaver, which is obscuring any active programs or open files. The forensic team is under pressure to preserve the integrity of the evidence without modifying or tampering with any data on the machine.

The investigator needs to capture a clear image of the programs running on the screen to document the evidence properly. However, they are uncertain about how to proceed in this situation to avoid potentially altering any information on the computer. What should the investigator do to capture the active programs on the screen and document the evidence effectively?

Options:
A.

Reboot the machine to force the system to show the programs running after the restart.

B.

Move the mouse slightly and slowly to wake up the screen from the screensaver, then photograph the active programs and document them.

C.

Unplug the computer ' s main power cord to reset the system and clear any volatile data.

D.

Disconnect the network cable to prevent any remote access while documenting the evidence.

Questions 119

During a corporate fraud investigation, analysts examine a workstation where a user attempted to obscure web activity by relying on private browsing features across multiple modern browsers. Although browser-level traces appear limited, investigators identify residual evidence indicating that user-entered queries and browsing fragments persisted beyond the active session lifecycle. From which artifact can investigators most reliably recover this type of residual evidence across multiple browsers?

Options:
A.

Cookies

B.

pagefile.sys

C.

DNS cache

D.

Temporary database files

Questions 120

During an investigation of anomalous CPU timing patterns on a compromised virtual machine hosted by a telecom provider, forensic analysts discover that the attacker launched a malicious VM on the same physical host as the target instance and extracted cryptographic keys by analyzing shared cache behavior. Which type of cloud computing attack does this technique represent?

Options:
A.

Side-Channel Attack

B.

Service Hijacking via Network Sniffing

C.

Service Hijacking via Social Engineering

D.

Wrapping Attack