Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :May 01, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V9 Questions & Answers

  • Question 361:

    Which of the following standard is based on a legal precedent regarding the admissibility of scientific examinations or experiments in legal cases?

    A. Daubert Standard

    B. Schneiderman Standard

    C. Frye Standard

    D. FERPA standard

  • Question 362:

    Which device in a wireless local area network (WLAN) determines the next network point to which a packet should be forwarded toward its destination?

    A. Wireless router

    B. Wireless modem

    C. Antenna

    D. Mobile station

  • Question 363:

    Which of the following attacks allows attacker to acquire access to the communication channels between the victim and server to extract the information?

    A. Man-in-the-middle (MITM) attack

    B. Replay attack

    C. Rainbow attack

    D. Distributed network attack

  • Question 364:

    First response to an incident may involve three different groups of people, and each will have differing skills and need to carry out differing tasks based on the incident. Who is responsible for collecting, preserving, and packaging electronic evidence?

    A. System administrators

    B. Local managers or other non-forensic staff

    C. Forensic laboratory staff

    D. Lawyers

  • Question 365:

    Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?

    A. 802.11a

    B. 802.11b

    C. 802.11g

    D. 802.11i

  • Question 366:

    Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.

    A. True

    B. False

  • Question 367:

    Attacker uses vulnerabilities in the authentication or session management functions such as exposed accounts, session IDs, logout, password management, timeouts, remember me. secret question, account update etc. to impersonate users, if a user simply closes the browser without logging out from sites accessed through a public computer, attacker can use the same browser later and exploit the user's privileges. Which of the following vulnerability/exploitation is referred above?

    A. Session ID in URLs

    B. Timeout Exploitation

    C. I/O exploitation

    D. Password Exploitation

  • Question 368:

    What is a first sector ("sector zero") of a hard disk?

    A. Master boot record

    B. System boot record

    C. Secondary boot record

    D. Hard disk boot record

  • Question 369:

    What is the smallest allocation unit of a hard disk?

    A. Cluster

    B. Spinning tracks

    C. Disk platters

    D. Slack space

  • Question 370:

    Data files from original evidence should be used for forensics analysis

    A. True

    B. False

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.