Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 692 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 692
Topic #: 1
[All 312-49v10 Questions]

As a forensic investigator, you are investigating a suspected cyberattack that led to the system crash of a Windows 10 computer. You obtained a memory dump file and intend to utilize Microsoft's DumpChk tool for a quick analysis. However, you are interested in isolating a particular process that you suspect is responsible for the crash, rather than inspecting the whole memory dump file. Based on the given details and your knowledge of Windows memory analysis, which of the following would be the most efficient approach?

  • A. Directly analyze the entire memory dump file using DumpChk, then isolate the details of the suspected process
  • B. Use ListDLLs.exe to list all DLLs loaded into the suspected process, then analyze these DLLs using DumpChk
  • C. Run DumpChk with the -y SymbolPath parameter, specifying the path to the symbols of the suspected process
  • D. Use the Process Dumper tool to dump the entire process space of the suspected process to a file, then analyze the dump file using DumpChk
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Boats
1 week, 6 days ago
Selected Answer: C
DumpChk Source: https://learn.microsoft.com DumpChk, a utility provided by Microsoft, serves as a tool for rapidly analyzing crash dump files. It provides a concise overview of the contents within the dump file, offering summary information. In cases where the dump file is damaged to the extent that it cannot be opened and examined with a debugger, DumpChk efficiently detects and notifies the investigator of this issue. Syntax: DumpChk [-y SymbolPath] DumpFile Parameters
upvoted 1 times
...
aqeel1506
4 months ago
D. Use the Process Dumper tool to dump the entire process space of the suspected process to a file, then analyze the dump file using DumpChk The textbook outlines that using tools like Process Dumper to extract a specific process’s memory space and then analyzing it with DumpChk is a standard and effective method for focusing on process-specific details from a memory dump. This approach allows for a more detailed and relevant analysis of the suspected process without the overhead of processing the entire memory dump.
upvoted 1 times
...
aqeel1506
4 months ago
D. Use the Process Dumper tool to dump the entire process space of the suspected process to a file, then analyze the dump file using DumpChk
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...