Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-49 Computer Hacking Forensic Investigator is now Stable and With Pass Result | Test Your Knowledge for Free

312-49 Practice Questions

Computer Hacking Forensic Investigator

Last Update 4 days ago
Total Questions : 531

Dive into our fully updated and stable 312-49 practice test platform, featuring all the latest exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-49. Use this test to pinpoint which areas you need to focus your study on.

312-49 PDF

312-49 PDF (Printable)
$43.75
$124.99

312-49 Testing Engine

312-49 PDF (Printable)
$50.75
$144.99

312-49 PDF + Testing Engine

312-49 PDF (Printable)
$63.7
$181.99
Question # 51

Which of the following techniques delete the files permanently?

Options:

A.  

Steganography

B.  

Artifact Wiping

C.  

Data Hiding

D.  

Trail obfuscation

Discussion 0
Question # 52

Chong-lee, a forensics executive, suspects that a malware is continuously making copies of files and folders on a victim system to consume the available disk space. What type of test would confirm his claim?

Options:

A.  

File fingerprinting

B.  

Identifying file obfuscation

C.  

Static analysis

D.  

Dynamic analysis

Discussion 0
Question # 53

What is cold boot (hard boot)?

Options:

A.  

It is the process of restarting a computer that is already in sleep mode

B.  

It is the process of shutting down a computer from a powered-on or on state

C.  

It is the process of restarting a computer that is already turned on through the operating system

D.  

It is the process of starting a computer from a powered-down or off state

Discussion 0
Question # 54

What should you do when approached by a reporter about a case that you are working on or have worked on?

Options:

A.  

Refer the reporter to the attorney that retained you

B.  

Say, "no comment"

C.  

Answer all the reporter’s questions as completely as possible

D.  

Answer only the questions that help your case

Discussion 0
Question # 55

Which of the following file system uses Master File Table (MFT) database to store information about every file and directory on a volume?

Options:

A.  

FAT File System

B.  

ReFS

C.  

exFAT

D.  

NTFS File System

Discussion 0
Question # 56

What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?

Options:

A.  

A compressed file

B.  

A Data stream file

C.  

An encrypted file

D.  

A reserved file

Discussion 0
Question # 57

In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?

Options:

A.  

The ISP can investigate anyone using their service and can provide you with assistance

B.  

The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant

C.  

The ISP can't conduct any type of investigations on anyone and therefore can't assist you

D.  

ISP's never maintain log files so they would be of no use to your investigation

Discussion 0
Question # 58

Which of the following data structures stores attributes of a process, as well as pointers to other attributes and data structures?

Options:

A.  

Lsproc

B.  

DumpChk

C.  

RegEdit

D.  

EProcess

Discussion 0
Question # 59

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded. What can the investigator do to prove the violation?

Options:

A.  

Image the disk and try to recover deleted files

B.  

Seek the help of co-workers who are eye-witnesses

C.  

Check the Windows registry for connection data (you may or may not recover)

D.  

Approach the websites for evidence

Discussion 0
Question # 60

Which of the following is a non-zero data that an application allocates on a hard disk cluster in systems running on Windows OS?

Options:

A.  

Sparse File

B.  

Master File Table

C.  

Meta Block Group

D.  

Slack Space

Discussion 0
Get 312-49 dumps and pass your exam in 24 hours!

Free Exams Sample Questions