Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 321 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 321
Topic #: 1
[All 312-49v10 Questions]

An executive has leaked the company trade secrets through an external drive. What process should the investigation team take if they could retrieve his system?

  • A. Postmortem Analysis
  • B. Real-Time Analysis
  • C. Packet Analysis
  • D. Malware Analysis
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
aqeel1506
4 months, 1 week ago
The other options are not directly related to this scenario: B. Real-Time Analysis: Involves monitoring a system or network in real-time to detect and respond to incidents as they occur. C. Packet Analysis: Involves analyzing network traffic packet by packet to understand communication patterns and identify potential security issues. D. Malware Analysis: Involves analyzing malware samples to understand their behavior, capabilities, and potential impact.
upvoted 1 times
...
aqeel1506
4 months, 1 week ago
The correct answer is A. Postmortem Analysis. Postmortem analysis, also known as dead box analysis, is a digital forensic process that involves analyzing a computer system or device after an incident has occurred, in this case, the leak of company trade secrets through an external drive. The goal of postmortem analysis is to reconstruct the events leading up to and during the incident, identify the source and scope of the leak, and gather evidence for potential legal action. If the investigation team can retrieve the executive's system, they would perform a postmortem analysis to: Image the hard drive or collect a bit-for-bit copy of the data Analyze the file system, registry, and other data structures Look for evidence of data exfiltration, such as files copied to external drives or uploaded to cloud storage Check for any malware or unauthorized access Reconstruct the executive's activities leading up to the leak
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...