Exam Details

  • Exam Code
    :312-49
  • Exam Name
    :ECCouncil Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :May 05, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49 Questions & Answers

  • Question 441:

    You are working in the security Department of law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?

    A. 10

    B. 25

    C. 110

    D. 135

  • Question 442:

    Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

    A. Use VMware to be able to capture the data in memory and examine it

    B. Give the Operating System a minimal amount of memory, forcing it to use a swap file

    C. Create a Separate partition of several hundred megabytes and place the swap file there

    D. Use intrusion forensic techniques to study memory resident infections

  • Question 443:

    When reviewing web logs, you see an entry for resource not found in the HTTP status code filed. What is the actual error code that you would see in the log for resource not found?

    A. 202

    B. 404

    C. 505

    D. 909

  • Question 444:

    When examining a hard disk without a write-blocker, you should not start windows because Windows will write data to the:

    A. Recycle Bin

    B. MSDOS.sys

    C. BIOS

    D. Case files

  • Question 445:

    You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected. What are two common methods used by password cracking software that you can use to obtain the password?

    A. Limited force and library attack

    B. Brute Force and dictionary Attack

    C. Maximum force and thesaurus Attack

    D. Minimum force and appendix Attack

  • Question 446:

    What type of file is represented by a colon (:) with a name following it in the Master File Table of NTFS disk?

    A. A compressed file

    B. A Data stream file

    C. An encrypted file

    D. A reserved file

  • Question 447:

    An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer. Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

    A. EFS uses a 128-bit key that can't be cracked, so you will not be able to recover the information

    B. When the encrypted file was copied to the floppy disk, it was automatically unencrypted, so you can recover the information.

    C. The EFS Revoked Key Agent can be used on the Computer to recover the information

    D. When the Encrypted file was copied to the floppy disk, the EFS private key was also copied to the floppy disk, so you can recover the information.

  • Question 448:

    While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?

    A. Keep the information of file for later review

    B. Destroy the evidence

    C. Bring the information to the attention of the prosecutor, his or her supervisor or finally to the judge

    D. Present the evidence to the defense attorney

  • Question 449:

    In Microsoft file structures, sectors are grouped together to form:

    A. Clusters

    B. Drives

    C. Bitstreams

    D. Partitions

  • Question 450:

    When you carve an image, recovering the image depends on which of the following skills?

    A. Recognizing the pattern of the header content

    B. Recovering the image from a tape backup

    C. Recognizing the pattern of a corrupt file

    D. Recovering the image from the tape backup

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.