Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-49v11 Practice Exam with Questions & Answers | Set: 8

Questions 71

Kaysen, a forensic investigator, was examining a compromised Windows machine. During the investigation, Kaysen needs to collect crucial information about the applications and services running on the machine to understand the impact of the breach. The investigator must gather real-time volatile evidence, such as active processes and running services, while ensuring that the data collection does not interfere with or alter the system’s state. Which of the following tools will help Kaysen in the above scenario?

Options:
A.

ExifTool

B.

Wireshark

C.

tasklist

D.

Hexinator

ECCouncil 312-49v11 Premium Access
Questions 72

A large multinational corporation, specializing in financial services, recently experienced a potential data breach that affected their critical business systems. As part of the forensic investigation, the organization must quickly restore its servers, both fully and at a granular level, to determine the extent of the breach and verify the integrity of sensitive financial data. The forensic team needs a comprehensive and reliable tool that can perform full image-level backups of their servers, as well as allow for selective file and folder restores in order to investigate individual systems and recover specific documents and configuration files. The tool should be able to handle both physical and virtual environments efficiently, ensuring minimal downtime and accurate data recovery.

Given the organization ' s need for rapid and reliable recovery, the forensic team must choose a tool that can restore entire systems in case of failure while also offering the flexibility to restore individual files or folders from the backup image. This capability is critical for isolating the compromised systems and recovering vital business records that may have been affected by the breach. The organization requires a solution that not only restores data but also provides the ability to maintain business continuity during the investigation, ensuring that systems are up and running as quickly as possible while maintaining forensic integrity.

Which of the following forensic tools would be best suited for this task?

Options:
A.

Snagit

B.

Macrium Reflect Server

C.

VMware vSphere Hypervisor

D.

Ezvid

Questions 73

During a forensic investigation, the investigator needs to collect data from a suspect ' s smartphone. The investigator is aware of the need to follow proper procedures to ensure the data is admissible in court. The investigator must also take into account legal and ethical issues, particularly when handling mobile devices that may contain personal and sensitive information. What should the investigator do to ensure compliance with legal requirements while collecting data from the mobile device?

Options:
A.

Obtain permission from the device owner and ensure that the evidence gathering process complies with applicable regulations.

B.

Disconnect the device from the internet to avoid any external interference during data collection, but do not document this action.

C.

Use any available forensic tool without checking for compatibility or regulatory compliance.

D.

Collect data from the mobile device without documenting the process, as it will speed up the investigation.

Questions 74

A system administrator is configuring a new storage array for a critical application and selects a RAID level that uses data stripping and dedicated parity. The RAID setup requires a minimum of three disks, and it ensures data is striped at the byte level across multiple drives, with one drive set aside to store the parity information for fault tolerance. After configuring the RAID system, the administrator tests its ability to tolerate a single drive failure and confirms the system can still function without data loss. Which RAID level is the system administrator using in this scenario?

Options:
A.

RAID 1

B.

RAID 3

C.

RAID 10

D.

RAID 0

Questions 75

Amelia, a cloud security analyst, is investigating a security breach in a cloud-based system where an adversary has managed to execute malicious code within the cloud environment. The attack was executed by intercepting and manipulating a SOAP message during transmission, duplicating the body of the message, and sending it to the server as though it was from a legitimate user. This manipulation resulted in the adversary gaining unauthorized access to the cloud system. What type of cloud-based attack did the adversary perform in this situation?

Options:
A.

Domain sniffing

B.

Cybersquatting

C.

Domain hijacking

D.

Wrapping attack

Questions 76

During a forensic investigation into a recent security incident within an organization, the investigator is tasked with documenting every action taken with the evidence to ensure proper chain of custody. The investigator carefully documents every action taken with the evidence in a logbook. The evidence is tagged with unique identifiers to prevent confusion. A detailed chain of custody record is also created to track the evidence ' s movement and handling throughout the investigation. Which investigation step is the investigator performing in this scenario?

Options:
A.

The investigator is preserving the evidence collected from the incident site.

B.

The investigator is performing scoping on the location where the security incident took place.

C.

The investigator is carrying out data analysis on the evidence for potential findings related to the breach.

D.

The investigator is conducting a search and seizure of the evidence related to the security incident.

Questions 77

Sarah, a forensic investigator, is conducting a post-compromise investigation on a company’s server that contains sensitive data. To ensure the deleted files do not fall into the wrong hands, she follows a media sanitization procedure . The process involves overwriting the deleted data 6 times with alternating sequences of 0x00 and 0xFF, followed by a final overwrite using the pattern 0xAA .

Which of the following media sanitization standards has Sarah followed in this scenario?

Options:
A.

NAVSO P-5239-26 (MFM)

B.

GOST P50739-95

C.

VSITR

D.

DoD 5220.22-M

Questions 78

During a data-exfiltration case at a Seattle design firm, investigators need the macOS encrypted container that securely stores user account names and passwords for Mac, apps, servers, and websites and can also hold confidential information such as credit card numbers or bank PIN numbers. What Mac forensics data source should they examine?

Options:
A.

Apple Mail

B.

Time Machine

C.

Property list or plist files

D.

Keychain

Questions 79

Alice decides to make a purchase on a popular e-commerce website. After adding items to her cart and proceeding to checkout, she notices that she is already logged into her account, thanks to the “Remember Me” feature enabled by the website. However, Alice becomes concerned when she realizes that her friend had previously warned her about the risks of cookie poisoning attacks.

Which of the following actions is most advisable for Alice to take next?

Options:
A.

Clear cookies, log out, proceed with caution.

B.

Implement MFA for cookie protection.

C.

Create new account to avoid cookie risks.

D.

Proceed with VPN and privacy extension, assuming safety.

Questions 80

During call setup, a telecommunications service provider employs a multifaceted approach to verify the identity of both the calling and called parties, ensuring the legitimacy of the users involved. Sarah, a security analyst at the provider, oversees the process, utilizing a combination of unique identifiers to obtain subscriber information and perform location tracking.

Which specific mechanism stands out as the primary means for the service provider to ensure user identity during call setup?

Options:
A.

By analyzing the duration of the call.

B.

By tracking the location of the caller only.

C.

By monitoring the content of the call.

D.

By utilizing IMSI and IMEI information.