Shane has started the static analysis of a malware and is using the tool ResourcesExtract to find more details of the malicious program. What part of the analysis is he performing?
A. Identifying File Dependencies
B. Strings search
C. Dynamic analysis
D. File obfuscation
A master boot record (MBR) is the first sector (“sector zero”) of a data storage device. What is the size of MBR?
A. Depends on the capacity of the storage device
B. 1048 Bytes
C. 4092 Bytes
D. 512 Bytes
What does 254 represent in ICCID 89254021520014515744?
A. Industry Identifier Prefix
B. Country Code
C. Individual Account Identification Number
D. Issuer Identifier Number
Which of the following tool enables data acquisition and duplication?
A. Colasoft's Capsa
B. DriveSpy
C. Wireshark
D. Xplico
What is the primary function of the tool CHKDSK in Windows that authenticates the file system reliability of a volume?
A. Repairs logical file system errors
B. Check the disk for hardware errors
C. Check the disk for connectivity errors
D. Check the disk for Slack Space
When a user deletes a file or folder, the system stores complete path including the original filename is a special hidden file called “INFO2” in the Recycled folder. If the INFO2 file is deleted, it is recovered when you ______________________.
A. Undo the last action performed on the system
B. Reboot Windows
C. Use a recovery tool to undelete the file
D. Download the file from Microsoft website
Jacky encrypts her documents using a password. It is known that she uses her daughter's year of birth as part of the password. Which password cracking technique would be optimal to crack her password?
A. Rule-based attack
B. Brute force attack
C. Syllable attack
D. Hybrid attack
Which of the following tool can the investigator use to analyze the network to detect Trojan activities?
A. Regshot
B. TRIPWIRE
C. RAM Computer
D. Capsa
Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?
A. Events history
B. Previously typed commands
C. History of the browser
D. Passwords used across the system
Which of the following files gives information about the client sync sessions in Google Drive on Windows?
A. sync_log.log
B. Sync_log.log
C. sync.log
D. Sync.log
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.