Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :ECCouncil Computer Hacking Forensic Investigator (V9)
  • Certification
    :Certified Ethical Hacker
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :486 Q&As
  • Last Updated
    :May 08, 2024

EC-COUNCIL Certified Ethical Hacker 312-49V9 Questions & Answers

  • Question 41:

    Why should you note all cable connections for a computer you want to seize as evidence?

    A. to know what outside connections existed

    B. in case other devices were connected

    C. to know what peripheral devices exist

    D. to know what hardware existed

  • Question 42:

    Madison is on trial for allegedly breaking into her university internal network. The police raided her dorm room and seized all of her computerMadison is on trial for allegedly breaking into her university? internal network. The police raided her dorm room and seized all of her computer equipment. Madison lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment isequipment. Madison? lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison lawyer trying to prove the police violated?Madison? lawyer trying to prove the police violated?

    A. The 10th Amendment

    B. The 5th Amendment

    C. The 1st Amendment

    D. The 4th Amendment

  • Question 43:

    Printing under a Windows Computer normally requires which one of the following files types to be created?

    A. EME

    B. MEM

    C. EMF

    D. CME

  • Question 44:

    In a FAT32 system, a 123 KB file will use how many sectors?

    A. 34

    B. 25

    C. 11

    D. 56

    E. 246

  • Question 45:

    After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?

    A. Enable BGP

    B. Enable direct broadcasts

    C. Disable BGP

    D. Disable direct broadcasts

  • Question 46:

    Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do not write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

    A. Use Vmware to be able to capture the data in memory and examine it

    B. Give the Operating System a minimal amount of memory, forcing it to use a swap file

    C. Create a Separate partition of several hundred megabytes and place the swap file there

    D. Use intrusion forensic techniques to study memory resident infections

  • Question 47:

    Sectors in hard disks typically contain how many bytes?

    A. 256

    B. 512

    C. 1024

    D. 2048

  • Question 48:

    Click on the Exhibit Button To test your website for vulnerabilities, you type in a Quotation mark (? for the username field. After you click Ok, you receive the following error message window: What can you infer from this error window?

    A. SQL injection is not possible

    B. SQL injection is possible

    C. The user for line 3306 in the SQL database has a weak password

    D. The Quotation mark (? is a valid username

  • Question 49:

    All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?

    A. Blackberry Message Center

    B. Microsoft Exchange

    C. Blackberry WAP gateway

    D. Blackberry WEP gateway

  • Question 50:

    John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this?

    A. The SID of Hillary network account

    B. The SAM file from Hillary computer

    C. The network shares that Hillary has permissions

    D. Hillary network username and password hash

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.