Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-49v11 Practice Exam with Questions & Answers | Set: 13

Questions 121

During a cybersecurity investigation, logs from a Cisco switch, VPN, and DNS server are collected. These logs contain valuable information about network activities and potential security breaches.

In digital forensics, what role do Cisco switch, VPN, and DNS server logs play when analyzing network incidents?

Options:
A.

Provides insights on network traffic, device connections, and security incidents.

B.

Tracks website visits and browser history exclusively.

C.

Not pertinent to digital forensics.

D.

Details user activities within the local network.

ECCouncil 312-49v11 Premium Access
Questions 122

During a forensic investigation of a compromised Windows system, Investigator Sarah is tasked with extracting artifacts related to the system ' s pagefile.sys . She needs to navigate through the registry to locate this specific information. Which of the following registry paths should Sarah examine to extract pagefile.sys artifacts from the system?

Options:
A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

B.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Windows

C.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName

D.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management

Questions 123

An organization is working to minimize the eDiscovery costs associated with the extensive analysis of large sets of electronic data. To achieve this, the organization employs advanced methodologies and automated processes that allow them to effectively narrow down the amount of data that requires detailed examination, thus enhancing efficiency while maintaining compliance. By utilizing specific platforms and processes, the organization ensures that only the pertinent data is analyzed, and redundant data is excluded early in the workflow.

Which best practice is the organization implementing to ensure efficient data examination?

Options:
A.

The organization implements a data retention tool to securely dispose of data that is no longer necessary.

B.

The organization uses technology-assisted review (TAR) and data reduction tools to exclude irrelevant data from the review process.

C.

The organization employs tools to ensure a secure chain of custody throughout the entire eDiscovery process.

D.

The organization uses data mapping tools to identify custodians and track the location of relevant data.

Questions 124

During a post-incident investigation at a retail technology company, forensic analysts must reconstruct a timeline of unauthorized modifications made to cloud resources across multiple AWS accounts. The investigation requires visibility into control-plane activity so analysts can attribute actions to specific identities and understand how configuration changes were initiated and propagated throughout the environment. How should investigators obtain this account-wide record of management activity to support timeline reconstruction?

Options:
A.

Amazon S3 Server Access Logging

B.

AWS CLI

C.

Amazon CloudWatch

D.

AWS CloudTrail

Questions 125

During a multinational fraud investigation, forensic analysts are asked to determine where evidence stored in Microsoft Azure can legally reside. The organization ' s Azure environment includes multiple region pairs designed for redundancy and compliance, each operating under the same market-level policies for data residency. Which Azure component best represents this configuration?

Options:
A.

Non-regional Service

B.

Availability Zone

C.

Region

D.

Geography

Questions 126

Andrew, a system administrator, is examining the UEFI boot process of a server. During the process, Andrew notices that the system is verifying the integrity of the bootloader and checking the settings before proceeding to load the operating system. The system performs cryptographic checks to ensure that only trusted software can be loaded. Andrew realizes this phase also ensures that the system boots in a secure state, adhering to policies. Identify the UEFI boot process phase Andrew is currently in.

Options:
A.

Boot device selection phase

B.

Pre-EFI initialization phase

C.

Driver execution environment phase

D.

Security phase

Questions 127

While reviewing Cisco IOS logs for suspicious network traffic, an administrator encounters a log message with the mnemonic " %SEC-6-IPACCESSLOGP.,‘ The message indicates that a packet matching the log criteria for the given access list has been detected, either for TCP or UDP traffic. Which of the following describes the log entry?

Options:
A.

A packet has been dropped due to an access control list (ACL) rule.

B.

A packet matching the criteria defined in an access list has been allowed or denied, and it was logged for monitoring.

C.

A system-level error has occurred, related to excessive network traffic.

D.

A failed connection attempt was detected on the network.

Questions 128

Lucas, a forensic investigator, has been tasked with analyzing the behavior of a malware sample that has infected a Linux-based system. After executing the malware, Lucas suspects that the malware is performing suspicious activities such as modifying system files, accessing restricted resources, and interacting with the kernel. In order to track the malware ' s interaction with the operating system, Lucas decides to monitor the system calls made by the malware during its execution. To gather this data, which of the following tools should Lucas use to effectively track and analyze the system calls initiated by the malware, providing insights into how the malware communicates with the OS and performs its malicious activities?

Options:
A.

Process Explorer

B.

strace

C.

Autoruns

D.

Regshot

Questions 129

In a large-scale healthcare breach in Boston, forensic investigators must archive several terabytes of compromised patient records for long-term evidence preservation. Since the data will be written once as forensic images and accessed infrequently, analysts require the storage technology that offers maximum capacity at lower cost, even if endurance and performance are reduced. What type of NAND flash memory in the seized SSD best meets this forensic requirement?

Options:
A.

Multi-level cell MLC

B.

Triple-level cell TLC

C.

Quad-level cell QLC

D.

Single-level cell SLC

Questions 130

In the realm of web accessibility, there are three layers: the Surface Web , which is easily accessible and indexed by standard search engines; the Deep Web , which contains unindexed content such as confidential databases and private portals; and the Dark Web , a clandestine environment often associated with illegal activities like drug trafficking and cybercrime, accessible through specialized browsers such as Tor.

What distinguishes the Dark Web from the Surface and Deep Web?

Options:
A.

It contains legal dossiers and financial records.

B.

It enables complete anonymity through encryption.

C.

It requires authorization to access.

D.

It is indexed by search engines.