Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-49v10 Practice Questions

Computer Hacking Forensic Investigator (CHFI-v10)

Last Update 2 days ago
Total Questions : 704

Dive into our fully updated and stable 312-49v10 practice test platform, featuring all the latest CHFI v10 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CHFI v10 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-49v10. Use this test to pinpoint which areas you need to focus your study on.

312-49v10 PDF

312-49v10 PDF (Printable)
$43.75
$124.99

312-49v10 Testing Engine

312-49v10 PDF (Printable)
$50.75
$144.99

312-49v10 PDF + Testing Engine

312-49v10 PDF (Printable)
$63.7
$181.99
Question # 31

Which of the following data structures stores attributes of a process, as well as pointers to other attributes and data structures?

Options:

A.  

Lsproc

B.  

DumpChk

C.  

RegEdit

D.  

EProcess

Discussion 0
Question # 32

What file structure database would you expect to find on floppy disks?

Options:

A.  

NTFS

B.  

FAT32

C.  

FAT16

D.  

FAT12

Discussion 0
Question # 33

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

Options:

A.  

Closed

B.  

Open

C.  

Stealth

D.  

Filtered

Discussion 0
Question # 34

Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

Options:

A.  

Use VMware to be able to capture the data in memory and examine it

B.  

Give the Operating System a minimal amount of memory, forcing it to use a swap file

C.  

Create a Separate partition of several hundred megabytes and place the swap file there

D.  

Use intrusion forensic techniques to study memory resident infections

Discussion 0
Question # 35

When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

Options:

A.  

Recycle Bin

B.  

MSDOS.sys

C.  

BIOS

D.  

Case files

Discussion 0
Question # 36

What TCP/UDP port does the toolkit program netstat use?

Options:

A.  

Port 7

B.  

Port 15

C.  

Port 23

D.  

Port 69

Discussion 0
Question # 37

After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

Options:

A.  

Only IBM AS/400 will reply to this scan

B.  

Only Windows systems will reply to this scan

C.  

A switched network will not respond to packets sent to the broadcast address

D.  

Only Unix and Unix-like systems will reply to this scan

Discussion 0
Question # 38

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

Options:

A.  

0

B.  

10

C.  

100

D.  

1

Discussion 0
Question # 39

During the course of a corporate investigation, you find that an Employee is committing a crime.

Can the Employer file a criminal complaint with Police?

Options:

A.  

Yes, and all evidence can be turned over to the police

B.  

Yes, but only if you turn the evidence over to a federal law enforcement agency

C.  

No, because the investigation was conducted without following standard police procedures

D.  

No, because the investigation was conducted without warrant

Discussion 0
Question # 40

An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

Options:

A.  

EFS uses a 128-bit key that can't be cracked, so you will not be able to recover the information

B.  

When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information.

C.  

The EFS Revoked Key Agent can be used on the Computer to recover the information

D.  

When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.

Discussion 0
Get 312-49v10 dumps and pass your exam in 24 hours!

Free Exams Sample Questions