Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-49v11 Practice Exam with Questions & Answers | Set: 4

Questions 31

During a securities-fraud litigation in New York, a corporation initiates an eDiscovery program. Before any data collection begins, the team must define the scenarios for evidence gathering, including what will be collected, where it resides, and how it will be preserved, to ensure admissibility and compliance. Which role is responsible for this task?

Options:
A.

IT Support Personnel

B.

Team Leads

C.

Legal Expert or eDiscovery Attorney

D.

Project Manager

ECCouncil 312-49v11 Premium Access
Questions 32

A forensic investigator is assigned to investigate a data leak involving the distribution of sensitive corporate information across multiple online platforms. The suspect is believed to have shared the data discreetly through various public channels. To uncover evidence, the investigator needs to collect posts, photos, videos, and user interactions from multiple networks. The investigator requires a tool that can efficiently gather, organize, and analyze this data, ensuring the integrity of the evidence for further investigation. Which tool would be best suited for this task?

Options:
A.

LiME

B.

Elastic Stack

C.

Social Network Harvester

D.

Guymager

Questions 33

During a malware investigation at a financial institution in New York, forensic investigators executed a suspicious file on a Windows forensic workstation. Using the netstat -an command, they discovered that port 1177 had been opened and was actively connected. The investigators now need to determine whether the observed port activity is associated with legitimate services or indicative of malicious behavior. How should investigators evaluate the significance of this port activity?

Options:
A.

Review the list for any suspicious port number that is opened on the workstation

B.

Refer to online port databases

C.

Execute the suspect file on the forensic workstation

D.

Display all active TCP/IP connections along with a list of active ports using netstat -an

Questions 34

An organization has successfully defined its eDiscovery strategy, focusing on managing data collection efficiently for a legal investigation. As part of this strategy, the legal team is tasked with ensuring that only the relevant data is gathered from the appropriate sources. The legal team is responsible for identifying the data sources that contain electronically stored information (ESI) necessary for the investigation. Which best practice for eDiscovery is the legal team following in this case?

Options:
A.

Map the data to identify custodians and determine the location of the data for collection.

B.

Rely on self-collection by custodians without providing clear guidelines.

C.

Use directed collection to obtain all available data from custodians, including irrelevant files.

D.

Collect data only from one source to minimize collection time and resources.

Questions 35

A medium-sized company ' s IT department noticed a sudden surge in network traffic and peculiar DNS requests originating from their internal servers. Realizing it could be a malware attack, they recruited Lisa, a seasoned forensic investigator, to probe into the situation. Lisa decided to use a tool to analyze this unusual network behavior and particularly focus on monitoring DNS requests. What tool should Lisa use for this?

Options:
A.

Wireshark

B.

Nmap

C.

Snort

D.

Nessus

Questions 36

As part of a corporate policy-violation inquiry at a creative agency in New York City, an examiner reviews artifacts within a user ' s ~/Library/Preferences/ directory to correlate activity surrounding suspicious file transfers. The examiner needs a user-specific plist that records application usage relevant to the time window under review. What artifact best supports this analysis?

Options:
A.

Application Support/

B.

com.apple.recentitems.plist

C.

com.apple.desktop.plist

D.

com.apple.dock.plist

Questions 37

A forensic investigator is performing an eDiscovery process within an organization, following the EDRM framework. The investigator focuses on narrowing down the volume of electronically stored information (ESI) by eliminating unnecessary data and converting it into a more manageable format that can be easily analyzed or examined. The investigator is ensuring that the data is prepared appropriately for the next phase in eDiscovery. Which EDRM stage is the investigator executing in the above scenario?

Options:
A.

The investigator is performing the analysis phase to interpret the data’s significance.

B.

The investigator is executing the production phase to finalize the data for legal use.

C.

The investigator is conducting the review phase to assess the data.

D.

The investigator is handling the processing phase to streamline the data for easier handling.

Questions 38

James is a seasoned digital forensic investigator at an international law firm dealing with a convoluted case of industrial espionage. The attacker, believed to be a disgruntled former employee, allegedly used a sophisticated network of compromised internal and external systems to steal sensitive data. Multiple jurisdictions and regulations are involved, with systems located in various countries. The firm’s legal team is concerned about the rules of evidence and obtaining the necessary warrants for search and seizure across different legal systems. To make matters more complex, some of the firm’s clients are refusing to give consent for James to access and investigate their systems, further complicating the evidence-gathering process. What should James ' s initial approach be in such a complex scenario?

Options:
A.

Limit the investigation to the firm ' s internal systems to avoid legal complications

B.

Forego the search warrants and start the investigation based on available data

C.

Proceed to access the clients ' systems covertly, as the firm owns the data

D.

Work with the legal team to understand and respect each jurisdiction ' s laws and seek necessary warrants

Questions 39

In a supply chain attack investigation at an automotive supplier in Detroit, Michigan, the forensics team examines alerts from endpoint antivirus systems indicating suspicious file downloads and network IDS sensors reporting anomalous outbound DNS queries. Independently, the alerts provide limited insight. The team consolidates these sources to identify relationships and reconstruct the broader compromise sequence. What event-correlation approach does this consolidation demonstrate?

Options:
A.

Route Correlation

B.

Cross-domain Event Correlation

C.

Multivariate Correlation

D.

Topology-based Event Correlation

Questions 40

In a smart city surveillance breach at a municipal agency in Chicago, Illinois, investigators identify anomalous data flows from field sensors to cloud services, where intermediate processing for data aggregation, data filtering, access control, and device information discovery would reveal policy violations. Which IoT architecture layer, acting as an interface between hardware and applications, should be the focus?

Options:
A.

Edge Technology Layer

B.

Middleware Layer

C.

Application Layer

D.

Access Gateway Layer