Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-49v11 Practice Exam with Questions & Answers | Set: 7

Questions 61

During an investigation of a high-profile cybercrime case, a law enforcement agency realized the need for specialized computer forensic investigators. Their general forensic investigators were struggling with the specific demands of computer forensics. Although they considered hiring external forensic investigators, they decided against it due to budget constraints. What could be a potential solution to this predicament?

Options:
A.

Training their current investigators in computer forensics.

B.

Outsourcing the investigations to a private firm.

C.

Investing in advanced forensic tools to assist their current investigators.

D.

Collaborating with international law enforcement agencies for assistance.

ECCouncil 312-49v11 Premium Access
Questions 62

You are a cybersecurity analyst tasked with performing dynamic malware analysis on a suspicious file received by your organization. Your objective is to understand the behavior of the malware by running it in a controlled environment and monitoring its actions without allowing it to propagate to the production network. As a cybersecurity analyst conducting dynamic malware analysis, what is a key aspect of designing the testing environment to ensure the safety of the production network?

Options:
A.

Implementing host integrity monitoring to track system changes caused by the malware.

B.

Disabling antivirus software to prevent interference with the malware ' s execution.

C.

Running the malware on physical machines to minimize the risk of network propagation.

D.

Using outdated operating systems to reduce compatibility issues with the malware.

Questions 63

A forensic investigator is examining a system that has experienced a failure during booting. The investigator discovers that the boot process was interrupted after the BIOS had initialized the system hardware . What is the next step in the boot process that would have occurred had it not failed?

Options:
A.

The boot manager would locate the bootable partition and load the MBR.

B.

The kernel would start and load the system ' s hardware abstraction layer (HAL).

C.

The system would load the ntoskrnl.exe file from the boot partition.

D.

The bootloader would load the operating system’s kernel.

Questions 64

A large financial institution experiences a ransomware attack that encrypts critical data, disrupting operations and requiring immediate evidence collection for legal action. The organization ' s pre-established policies allow for quick identification of digital evidence, collaboration with external experts, and minimal downtime by integrating evidence gathering with backup restoration processes. This preparation ensures that forensic activities do not further hinder business recovery, enabling the company to resume services while preserving evidence integrity. What key concept is demonstrated in this scenario that helps balance investigation needs with operations?

Options:
A.

Training and awareness

B.

Data backups and integrity

C.

Incident Response Integration

D.

Testing and drills

Questions 65

As a Computer Hacking Forensic Investigator, you ' re working on a case involving the unauthorized alteration of financial records within a major bank. The network administrators have identified a specific terminal where they believe the alterations originated. You have been tasked with examining this workstation. The administrators inform you that the machine has been powered down for fear of further alterations. In this scenario, which of the following would be your first step?

Options:
A.

Power up the machine and perform a live analysis to identify any running processes that might have been involved in the unauthorized alterations.

B.

Connect the machine to a separate network and use a network packet analyzer to monitor any ongoing traffic.

C.

Leave the system powered down, and initiate the forensic imaging process for further offline analysis.

D.

Create a bootable copy of the hard drive to analyze on a separate, secure machine

Questions 66

During a late-night incident at an e-commerce site in Houston, Texas, analysts see bursts of database errors and long time-taken values in IIS logs that coincide with requests where attackers reportedly appended encoded input to the URL. To isolate and compare the exact payload strings against these spikes, which IIS W3C field should investigators parse?

Options:
A.

sc-status

B.

cs-method

C.

cs-uri-stem

D.

cs-uri-query

Questions 67

Emily, a cyber forensic investigator, has been called upon to investigate a case involving smartphone evidence. The primary devices are an Android and an iOS phone. Emily decides to perform a logical acquisition on both devices to gather evidence. From the given choices, which tool should she use that can provide a thorough logical acquisition of both Android and iOS devices?

Options:
A.

ADB (Android Debug Bridge)

B.

UFED Cellebrite

C.

FTK Imager

D.

iPhone Backup Extractor

Questions 68

An investigator is reviewing the Apache access logs for suspicious traffic. She notices a series of requests for /admin.php from an IP address that is not normally associated with administrative access. What should she do next to determine whether this is an unauthorized access attempt?

Options:
A.

Cross-reference the IP address with the server’s DNS logs to see if it is part of a known network.

B.

Analyze the user-agent strings associated with the requests to identify the browser being used.

C.

Check the HTTP status codes in the log entries for these requests to identify whether they were successful.

D.

Review the timestamps of the requests to determine if they occurred during business hours.

Questions 69

During an after-hours breach at a Boston data center, an on-duty responder is concerned about preserving in-memory runtime information such as active process state, session data, and encryption material for later analysis. Which action would most jeopardize preservation of this information?

Options:
A.

Not having access to baseline documentation about the victim computer

B.

Shutting down or rebooting the victim computer; in this case, all volatile data are lost

C.

Failing to document the data-collection process

D.

Assuming that some components of the victim computer may be reliable and usable

Questions 70

As the senior forensic analyst for an international software development firm, you’re tasked with handling an ongoing investigation into suspected insider threats. Several project files have been reported as missing from the company’s secured servers. In one instance, a junior team member reported receiving an email, seemingly from his manager, instructing him to move specific files to a shared network location. After complying, the files disappeared. As part of your investigation, you have acquired disk images of all systems involved. What should be your next step?

Options:
A.

Perform an immediate analysis of the disk images, focusing on identifying and extracting any potential malware for analysis.

B.

Interview the team member who moved the files to determine if they had any role in the data loss.

C.

Prioritize the retrieval of deleted files from the disk images and scrutinize any software or processes that may have led to their deletion.

D.

Conduct a detailed analysis of the email headers and server logs to identify the origin of the deceptive email.