Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :ECCouncil Computer Hacking Forensic Investigator (V9)
  • Certification
    :Certified Ethical Hacker
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :486 Q&As
  • Last Updated
    :May 08, 2024

EC-COUNCIL Certified Ethical Hacker 312-49V9 Questions & Answers

  • Question 471:

    Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.

    A. True

    B. False

  • Question 472:

    The disk in the disk drive rotates at high speed, and heads in the disk drive are used only to read data.

    A. True

    B. False

  • Question 473:

    Hard disk data addressing is a method of allotting addresses to each ___________of data on a hard disk

    A. Physical block

    B. Logical block

    C. Operating system block

    D. Hard disk block

  • Question 474:

    An attack vector is a path or means by which an attacker can gain access to computer or network resources in order to deliver an attack payload or cause a malicious outcome.

    A. True

    B. False

  • Question 475:

    Which of the following log injection attacks uses white space padding to create unusual log entries?

    A. Word wrap abuse attack

    B. HTML injection attack

    C. Terminal injection attack

    D. Timestamp injection attack

  • Question 476:

    Deposition enables opposing counsel to preview an expert witness's testimony at trial. Which of the following deposition is not a standard practice?

    A. Both attorneys are present

    B. Only one attorneys is present

    C. No jury or judge

    D. Opposing counsel asks questions

  • Question 477:

    Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on 802.11 standards. Temporal Key Integrity Protocol (TKIP) enhances WEP by adding a rekeying mechanism to provide fresh encryption and integrity keys. Temporal keys are changed for every____________.

    A. 5,000 packets

    B. 10.000 packets

    C. 15,000 packets

    D. 20.000 packets

  • Question 478:

    What is a bit-stream copy?

    A. Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk

    B. A bit-stream image is the file that contains the NTFS files and folders of all the data on a disk or partition

    C. A bit-stream image is the file that contains the FAT32 files and folders of all the data on a disk or partition

    D. Creating a bit-stream image transfers only non-deleted files from the original disk to the image disk

  • Question 479:

    System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to function

    A. True

    B. False

  • Question 480:

    Router log files provide detailed Information about the network traffic on the Internet. It gives information about the attacks to and from the networks. The router stores log files in the____________.

    A. Router cache

    B. Application logs

    C. IDS logs

    D. Audit logs

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.