What is the investigator trying to analyze if the system gives the following image as output?
A. All the logon sessions
B. Currently active logon sessions
C. Inactive logon sessions
D. Details of users who can logon
Which of the following is found within the unique instance ID key and helps investigators to map the entry from USBSTOR key to the MountedDevices key?
A. ParentIDPrefix
B. LastWrite
C. UserAssist key
D. MRUListEx key
What technique is used by JPEGs for compression?
A. TIFF-8
B. ZIP
C. DCT
D. TCD
Analyze the hex representation of mysql-bin.000013 file in the screenshot below. Which of the following will be an inference from this analysis?
A. A user with username bad_guy has logged into the WordPress web application
B. A WordPress user has been created with the username anonymous_hacker
C. An attacker with name anonymous_hacker has replaced a user bad_guy in the WordPress database
D. A WordPress user has been created with the username bad_guy
Brian needs to acquire data from RAID storage. Which of the following acquisition methods is recommended to retrieve only the data relevant to the investigation?
A. Static Acquisition
B. Sparse or Logical Acquisition
C. Bit-stream disk-to-disk Acquisition
D. Bit-by-bit Acquisition
Which of the following is a precomputed table containing word lists like dictionary files and brute force lists and their hash values?
A. Directory Table
B. Rainbow Table
C. Master file Table (MFT)
D. Partition Table
What is the capacity of Recycle bin in a system running on Windows Vista?
A. 2.99GB
B. 3.99GB
C. Unlimited
D. 10% of the partition space
For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?
A. Bypassing iPhone passcode
B. Debugging iPhone
C. Rooting iPhone
D. Copying contents of iPhone
Which of the following does Microsoft Exchange E-mail Server use for collaboration of various e-mail applications?
A. Simple Mail Transfer Protocol (SMTP)
B. Messaging Application Programming Interface (MAPI)
C. Internet Message Access Protocol (IMAP)
D. Post Office Protocol version 3 (POP3)
An investigator is analyzing a checkpoint firewall log and comes across symbols. What type of log is he looking at?
A. Security event was monitored but not stopped
B. Malicious URL detected
C. An email marked as potential spam
D. Connection rejected
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.