Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 694 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 694
Topic #: 1
[All 312-49v10 Questions]

In an ongoing investigation, a computer forensics investigator encounters a suspicious file believed to be packed using a password-protected program packer. The investigator possesses both the knowledge of the packing tool used and the necessary unpacking tool. What critical step should the investigator consider before analyzing the packed file?

  • A. Conduct static analysis on the packed file immediately
  • B. Reverse engineer the packed file to understand the hidden attack tools
  • C. Attempt to decrypt the password prior to unpacking the file
  • D. Run the packed file in a controlled environment for dynamic analysis
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
aqeel1506
4 months ago
C. Attempt to decrypt the password prior to unpacking the file The textbook emphasizes that before performing any detailed analysis (static or dynamic), the file needs to be unpacked. If the file is protected by a password or encrypted, decrypting it is a necessary step to access its content. This allows for accurate analysis of the file's true nature and contents. Only after decryption and unpacking can the investigator proceed with further analysis or reverse engineering.
upvoted 1 times
...
jingu_bingo
5 months, 3 weeks ago
CHFIv11 page 445: "...investigators must first decrypt the password to unpack the file" but also "Investigators can dynamically analyze...controlled environment..." as the malware brings with it the unpacking tool. Either C or D, though I'd lean on C?
upvoted 1 times
...
Elb
6 months ago
Selected Answer: C
Program packers that are password-protected can pose a challenge during investigation as investigators need to first decrypt the password to unpack the file.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...