Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil 312-49v9 Practice Exam with Questions & Answers | Set: 12

Questions 166

While collecting Active Transaction Logs using SQL Server Management Studio, the query Select * from ::fn_dblog(NULL, NULL) displays the active portion of the transaction log file. Here, assigning NULL values implies?

Options:
A.

Start and end points for log sequence numbers are specified

B.

Start and end points for log files are not specified

C.

Start and end points for log files are specified

D.

Start and end points for log sequence numbers are not specified

ECCouncil 312-49v9 Premium Access
Questions 167

Centralized binary logging is a process in which many websites write binary and unformatted log data to a single log file. What extension should the investigator look to find its log file?

Options:
A.

.cbl

B.

.log

C.

.ibl

D.

.txt

Questions 168

An attacker has compromised a cloud environment of a company and used the employee information to perform an identity theft attack. Which type of attack is this?

Options:
A.

Cloud as a subject

B.

Cloud as a tool

C.

Cloud as an object

D.

Cloud as a service

Questions 169

Korey, a data mining specialist in a knowledge processing firm DataHub.com, reported his CISO that he has lost certain sensitive data stored on his laptop. The CISO wants his forensics investigation team to find if the data loss was accident or intentional. In which of the following category this case will fall?

Options:
A.

Civil Investigation

B.

Administrative Investigation

C.

Both Civil and Criminal Investigations

D.

Criminal Investigation

Questions 170

Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?

Options:
A.

Directory Table

B.

Rainbow Table

C.

Master file Table (MFT)

D.

Partition Table

Questions 171

Which of the following ISO standard defines file systems and protocol for exchanging data between optical disks?

Options:
A.

ISO 9660

B.

ISO/IEC 13940

C.

ISO 9060

D.

IEC 3490

Questions 172

Which of the following techniques delete the files permanently?

Options:
A.

Steganography

B.

Artifact Wiping

C.

Data Hiding

D.

Trail obfuscation

Questions 173

Select the data that a virtual memory would store in a Windows-based system.

Options:
A.

Information or metadata of the files

B.

Documents and other files

C.

Application data

D.

Running processes

Questions 174

To reach a bank web site, the traffic from workstations must pass through a firewall. You have been asked to review the firewall configuration to ensure that workstations in network 10.10.10.0/24 can only reach the bank web site 10.20.20.1 using https. Which of the following firewall rules meets this requirement?

Options:
A.

if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 443) then permit

B.

if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 80 or 443) then permit

C.

if (source matches 10.10.10.0 and destination matches 10.20.20.1 and port matches 443) then permit

Questions 175

Sheila is a forensics trainee and is searching for hidden image files on a hard disk. She used a forensic investigation tool to view the media in hexadecimal code for simplifying the search process. Which of the following hex codes should she look for to identify image files?

Options:
A.

ff d8 ff

B.

25 50 44 46

C.

d0 0f 11 e0

D.

50 41 03 04

Questions 176

Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.

Options:
A.

DevScan

B.

Devcon

C.

fsutil

D.

Reg.exe