Exam Details

  • Exam Code
    :312-49
  • Exam Name
    :ECCouncil Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 11, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49 Questions & Answers

  • Question 341:

    You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

    A. Polymorphic

    B. Metamorphic

    C. Oligomorhic

    D. Transmorphic

  • Question 342:

    Kyle is performing the final testing of an application he developed for the accounting department.

    His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following

    command. What is he testing at this point?

    #include #include int main(int argc, char

    *argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s string\n", argv[0]); return 1; }

    strcpy(buffer, argv[1]); return 0; }

    A. Buffer overflow

    B. SQL injection

    C. Format string bug

    D. Kernal injection

  • Question 343:

    A packet is sent to a router that does not have the packet destination address in its route table. How will the packet get to its proper destination?

    A. Root Internet servers

    B. Border Gateway Protocol

    C. Gateway of last resort

    D. Reverse DNS

  • Question 344:

    James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

    A. Smurf

    B. Trinoo

    C. Fraggle

    D. SYN flood

  • Question 345:

    Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?

    A. Only an HTTPS session can be hijacked

    B. HTTP protocol does not maintain session

    C. Only FTP traffic can be hijacked

    D. Only DNS traffic can be hijacked

  • Question 346:

    The objective of this act was to protect consumers' personal financial information held by financial institutions and their service providers.

    A. Gramm-Leach-Bliley Act

    B. Sarbanes-Oxley 2002

    C. California SB 1386

    D. HIPAA

  • Question 347:

    Why is it a good idea to perform a penetration test from the inside?

    A. It is never a good idea to perform a penetration test from the inside

    B. Because 70% of attacks are from inside the organization

    C. To attack a network from a hacker's perspective

    D. It is easier to hack from the inside

  • Question 348:

    Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What will this search produce?

    A. All sites that ghttech.net links to

    B. All sites that link to ghttech.net

    C. All search engines that link to .net domains

    D. Sites that contain the code: link:www.ghttech.net

  • Question 349:

    You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+ years experience in Windows Server environment 5+ years experience in Exchange 2000/2003 environment Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed What is this information posted on the job website considered?

    A. Social engineering exploit

    B. Competitive exploit

    C. Information vulnerability

    D. Trade secret

  • Question 350:

    Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

    A. Trick the switch into thinking it already has a session with Terri's computer

    B. Poison the switch's MAC address table by flooding it with ACK bits

    C. Crash the switch with a DoS attack since switches cannot send ACK bits D. Enable tunneling feature on the switch

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.