Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-49 Computer Hacking Forensic Investigator is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-49 Practice Questions

Computer Hacking Forensic Investigator

Last Update 23 hours ago
Total Questions : 531

Dive into our fully updated and stable 312-49 practice test platform, featuring all the latest exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-49. Use this test to pinpoint which areas you need to focus your study on.

312-49 PDF

312-49 PDF (Printable)
$54.25
$154.99

312-49 Testing Engine

312-49 PDF (Printable)
$59.5
$169.99

312-49 PDF + Testing Engine

312-49 PDF (Printable)
$74.55
$212.99
Question # 71

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

Options:

A.  

Trick the switch into thinking it already has a session with Terri's computer

B.  

Poison the switch's MAC address table by flooding it with ACK bits

C.  

Crash the switch with a DoS attack since switches cannot send ACK bits

D.  

Enable tunneling feature on the switch

Discussion 0
Question # 72

An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital video discs (DVDs) by using a large magnet. You inform him that this method will not be effective in wiping out the data because CDs and DVDs are ______________ media used to store large amounts of data and are not affected by the magnet.

Options:

A.  

logical

B.  

anti-magnetic

C.  

magnetic

D.  

optical

Discussion 0
Question # 73

From the following spam mail header, identify the host IP that sent this spam?

From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001

Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk

(8.11.6/8.11.6) with ESMTP id

fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)

Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by

viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1)

with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)

Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk

From: "china hotel web"

To: "Shlam"

Subject: SHANGHAI (HILTON HOTEL) PACKAGE

Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0

X-Priority: 3 X-MSMail-

Priority: Normal

Reply-To: "china hotel web"

Options:

A.  

137.189.96.52

B.  

8.12.1.0

C.  

203.218.39.20

D.  

203.218.39.50

Discussion 0
Question # 74

Law enforcement officers are conducting a legal search for which a valid warrant was obtained.

While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to describe how this evidence is admissible?

Options:

A.  

Plain view doctrine

B.  

Corpus delicti

C.  

Locard Exchange Principle

D.  

Ex Parte Order

Discussion 0
Question # 75

Why is it still possible to recover files that have been emptied from the Recycle Bin on a Windows computer?

Options:

A.  

The data is still present until the original location of the file is used

B.  

The data is moved to the Restore directory and is kept there indefinitely

C.  

The data will reside in the L2 cache on a Windows computer until it is manually deleted

D.  

It is not possible to recover data that has been emptied from the Recycle Bin

Discussion 0
Question # 76

Which of the following tools is not a data acquisition hardware tool?

Options:

A.  

UltraKit

B.  

Atola Insight Forensic

C.  

F-Response Imager

D.  

Triage-Responder

Discussion 0
Question # 77

Which of the following refers to the process of the witness being questioned by the attorney who called the latter to the stand?

Options:

A.  

Witness Authentication

B.  

Direct Examination

C.  

Expert Witness

D.  

Cross Questioning

Discussion 0
Question # 78

A packet is sent to a router that does not have the packet destination address in its route table.

How will the packet get to its proper destination?

Options:

A.  

Root Internet servers

B.  

Border Gateway Protocol

C.  

Gateway of last resort

D.  

Reverse DNS

Discussion 0
Question # 79

Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?

Options:

A.  

Network

B.  

Transport

C.  

Physical

D.  

Data Link

Discussion 0
Get 312-49 dumps and pass your exam in 24 hours!

Free Exams Sample Questions