exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 728 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 728
Topic #: 1
[All 312-49v10 Questions]

An investigator is examining a compromised system and comes across some files that have been compressed with a packer. The investigator knows that these files contain malicious content, but cannot access them due to a password protection mechanism. The investigator does not have the password. Which approach is the most suitable for accessing the contents of the packed files?

  • A. The investigator should attempt static analysis on the packed file
  • B. The investigator should run the packed executable in a controlled environment for dynamic analysis
  • C. The investigator should attempt to crack the password using a brute force attack
  • D. The investigator should attempt to reverse engineer the packed file in an attempt to bypass password protection
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
044f354
1 month ago
Selected Answer: B
Answer: B (A) ❌ Static analysis is limited without unpacking/decryption (B) ✅ Reveals runtime behavior without needing password (C) ❌ Brute-force is time-consuming and often impractical (D) ❌ Reverse engineering is complex and requires specialized skills Running the malware in a sandbox is most effective. ----- If you agree: UPVOTE. If you disagree: discuss with citations. Both actions help crowdsource correct answers. When you upvote someone with a yellow "SELECTED ANSWER: " banner, your vote is added to the community vote distribution.
upvoted 1 times
...
jingu_bingo
4 months, 2 weeks ago
Selected Answer: C
Keyword(s): "suitable for accessing the contents of the packed file", so a crack should be attempted, however unsuccessful.
upvoted 1 times
...
Elb
4 months, 3 weeks ago
B > Assuming the investigator does not know the tool that has been used to pack the file and doesn't have the tool to unpack it, the investigator will not be able to access it even with a cracked password.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago