Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-49 Computer Hacking Forensic Investigator is now Stable and With Pass Result | Test Your Knowledge for Free

312-49 Practice Questions

Computer Hacking Forensic Investigator

Last Update 4 days ago
Total Questions : 531

Dive into our fully updated and stable 312-49 practice test platform, featuring all the latest exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-49. Use this test to pinpoint which areas you need to focus your study on.

312-49 PDF

312-49 PDF (Printable)
$43.75
$124.99

312-49 Testing Engine

312-49 PDF (Printable)
$50.75
$144.99

312-49 PDF + Testing Engine

312-49 PDF (Printable)
$63.7
$181.99
Question # 31

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?

Options:

A.  

Ad hoc associations

B.  

Client mis-association

C.  

MAC spoofing

D.  

Rogue access points

Discussion 0
Question # 32

Which among the following search warrants allows the first responder to search and seize the victim’s computer components such as hardware, software, storage devices, and documentation?

Options:

A.  

John Doe Search Warrant

B.  

Citizen Informant Search Warrant

C.  

Electronic Storage Device Search Warrant

D.  

Service Provider Search Warrant

Discussion 0
Question # 33

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?

Options:

A.  

digital attack

B.  

denial of service

C.  

physical attack

D.  

ARP redirect

Discussion 0
Question # 34

Which program is the bootloader when Windows XP starts up?

Options:

A.  

KERNEL.EXE

B.  

NTLDR

C.  

LOADER

D.  

LILO

Discussion 0
Question # 35

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

Options:

A.  

0

B.  

10

C.  

100

D.  

1

Discussion 0
Question # 36

As a CHFI professional, which of the following is the most important to your professional reputation?

Options:

A.  

Your Certifications

B.  

The correct, successful management of each and every case

C.  

The free that you charge

D.  

The friendship of local law enforcement officers

Discussion 0
Question # 37

In Windows Security Event Log, what does an event id of 530 imply?

Options:

A.  

Logon Failure – Unknown user name or bad password

B.  

Logon Failure – User not allowed to logon at this computer

C.  

Logon Failure – Account logon time restriction violation

D.  

Logon Failure – Account currently disabled

Discussion 0
Question # 38

You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacture. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?

Options:

A.  

the attorney-work-product rule

B.  

Good manners

C.  

Trade secrets

D.  

ISO 17799

Discussion 0
Question # 39

A computer forensics investigator is inspecting the firewall logs for a large financial institution that has employees working 24 hours a day, 7 days a week.

Question # 39

What can the investigator infer from the screenshot seen below?

Options:

A.  

A smurf attack has been attempted

B.  

A denial of service has been attempted

C.  

Network intrusion has occurred

D.  

Buffer overflow attempt on the firewall.

Discussion 0
Question # 40

Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?

Options:

A.  

Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media

B.  

Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence

C.  

Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media

D.  

Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media

Discussion 0
Get 312-49 dumps and pass your exam in 24 hours!

Free Exams Sample Questions