exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 714 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 714
Topic #: 1
[All 312-49v10 Questions]

A cybersecurity investigator is working on a case involving a malicious executable suspected of being packed using a popular program packer. The investigator realizes that the packer used is password-protected. In such a scenario, what should be the investigator's first course of action to analyze the packed file?

  • A. Mount compound files
  • B. Perform static analysis on the packed file
  • C. Decrypt the password to unpack the file
  • D. Run the packed file in a controlled environment for dynamic analysis
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
044f354
5 months, 2 weeks ago
Selected Answer: C
EC-Council. (2021-03-01). Computer Hacking Forensics Investigator (CHFI) Version 10, 10th Edition. [[VitalSource Bookshelf version]]. Retrieved from vbk://9781635676969 Module 05 Defeating Anti-forensics Techniques Page 519 "Using this technique, the attacker can hide the evidence files into containers, thereby making them hard to detect. Therefore, during forensic investigations, the investigator’s first approach should be to mount compound files. Program packers that are password-protected can pose a challenge during investigation as investigators need to first decrypt the password to unpack the file." ----- mount compound files first UNLESS password-protected THEN first decrypt the password
upvoted 1 times
...
Elb
11 months, 3 weeks ago
Selected Answer: A
the investigator’s first approach should be to mount compound files.
upvoted 1 times
...
Elb
12 months ago
Program packers are used by attackers to hide their data. In this regard, the technique is similar to cryptography. The packers compress the files using various algorithms. Hence, unless the investigators know the tool that has been used to pack the file and have a tool to unpack it, they will not be able to access it. Using this technique, the attacker can hide the evidence files into containers, thereby making them hard to detect. Therefore, during forensic investigations, the investigator’s first approach should be to mount compound files. Program packers that are password-protected can pose a challenge during investigation as investigators need to first decrypt the password to unpack the file.
upvoted 1 times
044f354
5 months, 2 weeks ago
LITERALLY read your own post. (which is copied from the book cited here) EC-Council. (2021-03-01). Computer Hacking Forensics Investigator (CHFI) Version 10, 10th Edition. [[VitalSource Bookshelf version]]. Retrieved from vbk://9781635676969 "Therefore, during forensic investigations, the investigator’s first approach should be to mount compound files. Program packers that are password-protected can pose a challenge during investigation as investigators need to first decrypt the password to unpack the file." ----- mount compound files first UNLESS password-protected THEN first decrypt the password
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...