Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 22, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V9 Questions & Answers

  • Question 71:

    Click on the Exhibit Button Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette's duties include logging on to all the company's network equipment to ensure IOS versions are up-to-date and all the other security settings are as stringent as possible. Paulette presents the following screenshot to her boss so he can inform the client about necessary changes need to be made. From the screenshot, what changes should the client company make?

    A. The banner should include the Cisco tech support contact information as well

    B. The banner should have more detail on the version numbers for the networkeQuipment

    C. The banner should not state "only authorized IT personnel may proceed"

    D. Remove any identifying numbers, names, or version information

  • Question 72:

    How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?

    A. 16

    B. 32

    C. 64

    D. 48

  • Question 73:

    Law enforcement officers are conducting a legal search for which a valid warrant was obtained. While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to describe how this evidence is admissible?

    A. Plain view doctrine

    B. Corpus delicti

    C. Locard Exchange Principle

    D. Ex Parte Order

  • Question 74:

    Which part of the Windows Registry contains the user's password file?

    A. HKEY_LOCAL_MACHINE

    B. HKEY_CURRENT_CONFIGURATION

    C. HKEY_USER

    D. HKEY_CURRENT_USER

  • Question 75:

    Under which Federal Statutes does FBI investigate for computer crimes involving e- mail scams and mail fraud?

    A. 18 U.S.C. 1029 Possession of Access Devices

    B. 18 U.S.C. 1030 Fraud and related activity in connection with computers

    C. 18 U.S.C. 1343 Fraud by wire, radio or television

    D. 18 U.S.C. 1361 Injury to Government Property

    E. 18 U.S.C. 1362 Government communication systems

    F. 18 U.S.C. 1831 Economic Espionage Act

    G. 18 U.S.C. 1832 Trade Secrets Act

  • Question 76:

    When cataloging digital evidence, the primary goal is to

    A. Make bit-stream images of all hard drives

    B. Preserve evidence integrity

    C. Not remove the evidence from the scene

    D. Not allow the computer to be turned off

  • Question 77:

    Which of the following filesystem is used by Mac OS X?

    A. EFS

    B. HFS+

    C. EXT2

    D. NFS

  • Question 78:

    While looking through the IIS log file of a web server, you find the following entries:

    What is evident from this log file?

    A. Web bugs

    B. Cross site scripting

    C. Hidden fields

    D. SQL injection is possible

  • Question 79:

    Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document.

    What is that code called?

    A. the Microsoft Virtual Machine Identifier

    B. the Personal Application Protocol

    C. the Globally Unique ID

    D. the Individual ASCII String

  • Question 80:

    Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, reQuested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?

    A. Social Validation

    B. Friendship/Liking

    C. Reciprocation

    D. Scarcity

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.