312-49v9 Exam - ECCouncil Computer Hacking Forensic Investigator (V9)

certleader.com

Your success in is our sole target and we develop all our in a way that facilitates the attainment of this target. Not only is our material the best you can find, it is also the most detailed and the most updated. for EC-Council 312-49v9 are written to the highest standards of technical accuracy.

Check 312-49v9 free dumps before getting the full version:

NEW QUESTION 1
Which of the following is not a part of data acquisition forensics Investigation?

  • A. Permit only authorized personnel to access
  • B. Protect the evidence from extremes in temperature
  • C. Work on the original storage medium not on the duplicated copy
  • D. Disable all remote access to the system

Answer: C

NEW QUESTION 2
Where is the startup configuration located on a router?

  • A. Static RAM
  • B. BootROM
  • C. NVRAM
  • D. Dynamic RAM

Answer: C

NEW QUESTION 3
Sectors in hard disks typically contain how many bytes?

  • A. 256
  • B. 512
  • C. 1024
  • D. 2048

Answer: B

NEW QUESTION 4
When should an MD5 hash check be performed when processing evidence?

  • A. After the evidence examination has been completed
  • B. On an hourly basis during the evidence examination
  • C. Before and after evidence examination
  • D. Before the evidence examination has been completed

Answer: C

NEW QUESTION 5
Daryl, a computer forensics investigator, has just arrived at the house of an alleged computer hacker. Daryl takes pictures and tags all computer and peripheral equipment found in the house. Daryl packs all the items found in his van and takes them back to his lab for further examination. At his lab, Michael his assistant helps him with the investigation. Since Michael is still in training, Daryl supervises all of his work very carefully. Michael is not quite sure about the procedures to copy all the data off the computer and peripheral devices. How many data acquisition tools should Michael use when creating copies of the evidence for the investigation?

  • A. Two
  • B. One
  • C. Three
  • D. Four

Answer: A

NEW QUESTION 6
E-mail logs contain which of the following information to help you in your investigation?
(Select up to 4)

  • A. user account that was used to send the account
  • B. attachments sent with the e-mail message
  • C. unique message identifier
  • D. contents of the e-mail message
  • E. date and time the message was sent

Answer: ACDE

NEW QUESTION 7
You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says:
"This is a test." What is the result of this test?

  • A. Your website is vulnerable to SQL injection
  • B. Your website is vulnerable to CSS
  • C. Your website is vulnerable to web bugs
  • D. Your website is not vulnerable

Answer: B

NEW QUESTION 8
At what layer of the OSI model do routers function on?

  • A. 4
  • B. 3
  • C. 1
  • D. 5

Answer: B

NEW QUESTION 9
Hash injection attack allows attackers to inject a compromised hash into a local session and use the hash to validate network resources.

  • A. True
  • B. False

Answer: A

NEW QUESTION 10
Diskcopy is:

  • A. a utility by AccessData
  • B. a standard MS-DOS command
  • C. Digital Intelligence utility
  • D. dd copying tool

Answer: B

Explanation: diskcopy is a STANDARD DOS utility. C:WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.

NEW QUESTION 11
Hard disk data addressing is a method of allotting addresses to each ___ of data on a hard disk

  • A. Physical block
  • B. Logical block
  • C. Operating system block
  • D. Hard disk block

Answer: A

NEW QUESTION 12
The status of the network interface cards (NICs) connected to a system gives information about whether the system is connected to a wireless access point and what IP address is being used.
Which command displays the network configuration of the NICs on the system?

  • A. ipconfig /all
  • B. netstat
  • C. net session
  • D. tasklist

Answer: A

NEW QUESTION 13
Steven has been given the task of designing a computer forensics lab for the company he works for. He has found documentation on all aspects of how to design a lab except the number of exits needed. How many exits should Steven include in his design for the computer forensics lab?

  • A. Three
  • B. One
  • C. Two
  • D. Four

Answer: B

NEW QUESTION 14
Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?

  • A. Event logs
  • B. Audit logs
  • C. Firewall logs
  • D. IDS logs

Answer: A

NEW QUESTION 15
Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.

  • A. True
  • B. False

Answer: A

NEW QUESTION 16
MAC filtering is a security access control methodology, where a ____ is assigned to each network card to determine access to the network

  • A. 16-bit address
  • B. 24-bit address
  • C. 32-bit address
  • D. 48-bit address

Answer: D

Thanks for reading the newest 312-49v9 exam dumps! We recommend you to try the PREMIUM Certleader 312-49v9 dumps in VCE and PDF here: https://www.certleader.com/312-49v9-dumps.html (486 Q&As Dumps)