Pass the ECCouncil No Cert Assigned 312-49 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which of the following setups should a tester choose to analyze malware behavior?

Options:

A.

A virtual system with internet connection


B.

A normal system without internet connect


C.

A normal system with internet connection


D.

A virtual system with network simulation for internet connection


Questions # 32:

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data.

What method would be most efficient for you to acquire digital evidence from this network?

Options:

A.

create a compressed copy of the file with DoubleSpace


B.

create a sparse data copy of a folder or file


C.

make a bit-stream disk-to-image file


D.

make a bit-stream disk-to-disk file


Questions # 33:

The surface of a hard disk consists of several concentric rings known as tracks; each of these tracks has smaller partitions called disk blocks. What is the size of each block?

Options:

A.

512 bits


B.

512 bytes


C.

256 bits


D.

256 bytes


Questions # 34:

Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

Options:

A.

Rule-Based Approach


B.

Automated Field Correlation


C.

Field-Based Approach


D.

Graph-Based Approach


Questions # 35:

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years.

You navigate to archive. org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found?

Options:

A.

Web bug


B.

CGI code


C.

Trojan.downloader


D.

Blind bug


Questions # 36:

Which among the following search warrants allows the first responder to get the victim’s computer information such as service records, billing records, and subscriber information from the service provider?

Options:

A.

Citizen Informant Search Warrant


B.

Electronic Storage Device Search Warrant


C.

John Doe Search Warrant


D.

Service Provider Search Warrant


Questions # 37:

What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?

Options:

A.

A compressed file


B.

A Data stream file


C.

An encrypted file


D.

A reserved file


Questions # 38:

After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

Options:

A.

Only IBM AS/400 will reply to this scan


B.

Only Windows systems will reply to this scan


C.

A switched network will not respond to packets sent to the broadcast address


D.

Only Unix and Unix-like systems will reply to this scan


Questions # 39:

Which of the following tool creates a bit-by-bit image of an evidence media?

Options:

A.

Recuva


B.

FileMerlin


C.

AccessData FTK Imager


D.

Xplico


Questions # 40:

How often must a company keep log files for them to be admissible in a court of law?

Options:

A.

All log files are admissible in court no matter their frequency


B.

Weekly


C.

Monthly


D.

Continuously


Questions # 41:

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a “simple backup copy” of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a “simple backup copy” will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

Options:

A.

Robust copy


B.

Incremental backup copy


C.

Bit-stream copy


D.

Full backup copy


Questions # 42:

When should an MD5 hash check be performed when processing evidence?

Options:

A.

After the evidence examination has been completed


B.

On an hourly basis during the evidence examination


C.

Before and after evidence examination


D.

Before the evidence examination has been completed


Questions # 43:

Event correlation is the process of finding relevance between the events that produce a final result. What type of correlation will help an organization to correlate events across a set of servers, systems, routers and network?

Options:

A.

Same-platform correlation


B.

Network-platform correlation


C.

Cross-platform correlation


D.

Multiple-platform correlation


Questions # 44:

The offset in a hexadecimal code is:

Options:

A.

The last byte after the colon


B.

The 0x at the beginning of the code


C.

The 0x at the end of the code


D.

The first byte after the colon


Questions # 45:

What are the security risks of running a "repair" installation for Windows XP?

Options:

A.

Pressing Shift+F10gives the user administrative rights


B.

Pressing Shift+F1gives the user administrative rights


C.

Pressing Ctrl+F10 gives the user administrative rights


D.

There are no security risks when running the "repair" installation for Windows XP


Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions