Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

312-49v9 Computer Hacking Forensic Investigator (v9) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

312-49v9 Practice Questions

Computer Hacking Forensic Investigator (v9)

Last Update 1 day ago
Total Questions : 589

Dive into our fully updated and stable 312-49v9 practice test platform, featuring all the latest CHFIv9 exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free CHFIv9 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 312-49v9. Use this test to pinpoint which areas you need to focus your study on.

312-49v9 PDF

312-49v9 PDF (Printable)
$43.75
$124.99

312-49v9 Testing Engine

312-49v9 PDF (Printable)
$50.75
$144.99

312-49v9 PDF + Testing Engine

312-49v9 PDF (Printable)
$63.7
$181.99
Question # 11

What does the superblock in Linux define?

Options:

A.  

filesynames

B.  

diskgeometr

C.  

location of the firstinode

D.  

available space

Discussion 0
Question # 12

To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?

Options:

A.  

Computer Forensics Tools and Validation Committee (CFTVC)

B.  

Association of Computer Forensics Software Manufactures (ACFSM)

C.  

National Institute of Standards and Technology (NIST)

D.  

Society for Valid Forensics Tools and Testing (SVFTT)

Discussion 0
Question # 13

When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

Options:

A.  

Recycle Bin

B.  

MSDOS.sys

C.  

BIOS

D.  

Case files

Discussion 0
Question # 14

One way to identify the presence of hidden partitions on a suspect's hard drive is to:

Options:

A.  

Add up the total size of all known partitions and compare it to the total size of the hard drive

B.  

Examine the FAT and identify hidden partitions by noting an H in the partition Type field

C.  

Examine the LILO and note an H in the partition Type field

D.  

It is not possible to have hidden partitions on a hard drive

Discussion 0
Question # 15

Which of the following is NOT a graphics file?

Options:

A.  

Picture1.tga

B.  

Picture2.bmp

C.  

Picture3.nfo

D.  

Picture4.psd

Discussion 0
Question # 16

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

Options:

A.  

make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab

B.  

make an MD5 hash of the evidence and compare it to the standard database developed by NIST

C.  

there is no reason to worry about this possible claim because state labs are certified

D.  

sign a statement attesting that the evidence is the same as it was when it entered the lab

Discussion 0
Question # 17

From the following spam mail header, identify the host IP that sent this spam?

From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001

Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk

(8.11.6/8.11.6) with ESMTP id

fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)

Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by

viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1)

with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)

Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk

From: "china hotel web"

To: "Shlam"

Subject: SHANGHAI (HILTON HOTEL) PACKAGE

Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0

X-Priority: 3 X-MSMail-

Priority: Normal

Reply-To: "china hotel web"

Options:

A.  

137.189.96.52

B.  

8.12.1.0

C.  

203.218.39.20

D.  

203.218.39.50

Discussion 0
Question # 18

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What will this search produce?

Options:

A.  

All sites that ghttech.net links to

B.  

All sites that link to ghttech.net

C.  

All search engines that link to .net domains

D.  

Sites that contain the code: link:www.ghttech.net

Discussion 0
Question # 19

Software firewalls work at which layer of the OSI model?

Options:

A.  

Application

B.  

Network

C.  

Transport

D.  

Data Link

Discussion 0
Question # 20

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DI

G.  

What is Simon trying to accomplish here?

Options:

A.  

Send DOS commands to crash the DNS servers

B.  

Perform DNS poisoning

C.  

Perform a zone transfer

D.  

Enumerate all the users in the domain

Discussion 0
Get 312-49v9 dumps and pass your exam in 24 hours!

Free Exams Sample Questions