Pass the ECCouncil No Cert Assigned 312-49 Questions and answers with CertsForce

Viewing page 11 out of 11 pages
Viewing questions 151-165 out of questions
Questions # 151:

An Expert witness give an opinion if:

Options:

A.

The Opinion, inferences or conclusions depend on special knowledge, skill or training not within the ordinary experience of lay jurors


B.

To define the issues of the case for determination by the finder of fact


C.

To stimulate discussion between the consulting expert and the expert witness


D.

To deter the witness form expanding the scope of his or her investigation beyond the requirements of the case


Expert Solution
Questions # 152:

Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

Options:

A.

HKEY_LOCAL_MACHINE\hardware\windows\start


B.

HKEY_LOCAL_USERS\Software\Microsoft\old\Version\Load


C.

HKEY_CURRENT_USER\Microsoft\Default


D.

HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run


Expert Solution
Questions # 153:

When marking evidence that has been collected with the “aaa/ddmmyy/nnnn/zz” format, what does the “nnnn” denote?

Options:

A.

The initials of the forensics analyst


B.

The sequence number for the parts of the same exhibit


C.

The year he evidence was taken


D.

The sequential number of the exhibits seized by the analyst


Expert Solution
Questions # 154:

Which of the following files stores information about a local Google Drive installation such as User email ID, Local Sync Root Path, and Client version installed?

Options:

A.

filecache.db


B.

config.db


C.

sigstore.db


D.

Sync_config.db


Expert Solution
Questions # 155:

After suspecting a change in MS-Exchange Server storage archive, the investigator has analyzed it. Which of the following components is not an actual part of the archive?

Options:

A.

PRIV.STM


B.

PUB.EDB


C.

PRIV.EDB


D.

PUB.STM


Expert Solution
Questions # 156:

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

Options:

A.

Nessus is too loud


B.

Nessus cannot perform wireless testing


C.

Nessus is not a network scanner


D.

There are no ways of performing a "stealthy" wireless scan


Expert Solution
Questions # 157:

Smith, as a part his forensic investigation assignment, seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data in the mobile device. Smith found that the SIM was protected by a Personal Identification Number (PIN) code, but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He made three unsuccessful attempts, which blocked the SIM card. What can Jason do in this scenario to reset the PIN and access SIM data?

Options:

A.

He should contact the network operator for a Temporary Unlock Code (TUK)


B.

Use system and hardware tools to gain access


C.

He can attempt PIN guesses after 24 hours


D.

He should contact the network operator for Personal Unlock Number (PUK)


Expert Solution
Questions # 158:

Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?

Options:

A.

Microsoft Outlook


B.

Eudora


C.

Mozilla Thunderbird


D.

Microsoft Outlook Express


Expert Solution
Questions # 159:

Graphics Interchange Format (GIF) is a ____ RGB bitmap image format for images with up to 256 distinct colors per frame.

Options:

A.

8-bit


B.

32-bit


C.

16-bit


D.

24-bit


Expert Solution
Viewing page 11 out of 11 pages
Viewing questions 151-165 out of questions