Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-49 Computer Hacking Forensic Investigator is now Stable and With Pass Result | Test Your Knowledge for Free

312-49 Practice Questions

Computer Hacking Forensic Investigator

Last Update 4 days ago
Total Questions : 531

Dive into our fully updated and stable 312-49 practice test platform, featuring all the latest exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-49. Use this test to pinpoint which areas you need to focus your study on.

312-49 PDF

312-49 PDF (Printable)
$43.75
$124.99

312-49 Testing Engine

312-49 PDF (Printable)
$50.75
$144.99

312-49 PDF + Testing Engine

312-49 PDF (Printable)
$63.7
$181.99
Question # 11

In the following directory listing,

Question # 11

Which file should be used to restore archived email messages for someone using Microsoft Outlook?

Options:

A.  

Outlook bak

B.  

Outlook ost

C.  

Outlook NK2

D.  

Outlook pst

Discussion 0
Question # 12

Where should the investigator look for the Edge browser’s browsing records, including history, cache, and cookies?

Options:

A.  

ESE Database

B.  

Virtual Memory

C.  

Sparse files

D.  

Slack Space

Discussion 0
Question # 13

What type of attack sends SYN requests to a target system with spoofed IP addresses?

Options:

A.  

SYN flood

B.  

Ping of death

C.  

Cross site scripting

D.  

Land

Discussion 0
Question # 14

Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive?

22,164 cylinders/disk

80 heads/cylinder

63 sectors/track

Options:

A.  

53.26 GB

B.  

57.19 GB

C.  

11.17 GB

D.  

10 GB

Discussion 0
Question # 15

You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says: "This is a test."

What is the result of this test?

Options:

A.  

Your website is vulnerable to CSS

B.  

Your website is not vulnerable

C.  

Your website is vulnerable to SQL injection

D.  

Your website is vulnerable to web bugs

Discussion 0
Question # 16

For what purpose do the investigators use tools like iPhoneBrowser, iFunBox, OpenSSHSSH, and iMazing?

Options:

A.  

Bypassing iPhone passcode

B.  

Debugging iPhone

C.  

Rooting iPhone

D.  

Copying contents of iPhone

Discussion 0
Question # 17

What is the target host IP in the following command?

Options:

A.  

172.16.28.95

B.  

10.10.150.1

C.  

Firewalk does not scan target hosts

D.  

This command is using FIN packets, which cannot scan target hosts

Discussion 0
Question # 18

What is the location of the binary files required for the functioning of the OS in a Linux system?

Options:

A.  

/run

B.  

/bin

C.  

/root

D.  

/sbin

Discussion 0
Question # 19

In Steganalysis, which of the following describes a Known-stego attack?

Options:

A.  

The hidden message and the corresponding stego-image are known

B.  

During the communication process, active attackers can change cover

C.  

Original and stego-object are available and the steganography algorithm is known

D.  

Only the steganography medium is available for analysis

Discussion 0
Question # 20

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

Options:

A.  

Show outdated equipment so it can be replaced

B.  

List weak points on their network

C.  

Use attack as a launching point to penetrate deeper into the network

D.  

Demonstrate that no system can be protected against DoS attacks

Discussion 0
Get 312-49 dumps and pass your exam in 24 hours!

Free Exams Sample Questions