Eccouncil 312-49 Computer Hacking Forensic Investigator V10 Exam Practice Test

Page: 1 / 14
Total 704 questions
Question 1

You are the incident response manager at a regional bank. While performing routine auditing of web application logs, you find several attempted login submissions that contain the following strings:

What kind of attack has occurred?



Answer : C


Question 2

Which of the following tools is used to dump the memory of a running process, either immediately or when an error condition occurs?



Answer : C


Question 3

An investigator Is examining a file to identify any potentially malicious content. To avoid code execution and still be able to uncover hidden indicators of compromise (IOC), which type of examination should the investigator perform:



Answer : D


Question 4

Williamson is a forensic investigator. While investigating a case of data breach at a company, he is maintaining a document that records details such as the forensic processes applied on the collected evidence, particulars of people handling It. the dates and times when it Is being handled, and the place of storage of the evidence. What do you call this document?



Answer : D


Question 5

Consider a scenario where a forensic investigator is performing malware analysis on a memory dump acquired from a victims computer. The investigator uses Volatility Framework to analyze RAM contents; which plugin helps investigator to identify hidden processes or injected code/DLL in the memory dump?



Answer : D


Question 6

Identify the location of Recycle Bin on a Windows 7 machine that uses NTFS file system to store and retrieve files on the hard disk.



Answer : A


Question 7

Which set of anti-forensic tools/techniques allows a program to compress and/or encrypt an executable file to hide attack tools from being detected by reverse-engineering or scanning?



Answer : A


Page:    1 / 14   
Total 704 questions