Exam Details

  • Exam Code
    :312-49
  • Exam Name
    :ECCouncil Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 11, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49 Questions & Answers

  • Question 361:

    On Linux/Unix based Web servers, what privilege should the daemon service be run under?

    A. Guest

    B. Root

    C. You cannot determine what privilege runs the daemon service

    D. Something other than root

  • Question 362:

    What will the following URL produce in an unpatched IIS Web Server?

    http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\

    A. Directory listing of C: drive on the web server

    B. Insert a Trojan horse into the C: drive of the web server

    C. Execute a buffer flow in the C: drive of the web server

    D. Directory listing of the C:\windows\system32 folder on the web server

  • Question 363:

    What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

    A. Cached password hashes for the past 20 users

    B. Service account passwords in plain text

    C. IAS account names and passwords

    D. Local store PKI Kerberos certificates

  • Question 364:

    What operating system would respond to the following command?

    A. Windows 95

    B. FreeBSD

    C. Windows XP

    D. Mac OS X

  • Question 365:

    Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

    A. Tailgating

    B. Backtrapping

    C. Man trap attack

    D. Fuzzing

  • Question 366:

    Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

    A. Linux/Unix computers are easier to compromise

    B. Linux/Unix computers are constantly talking

    C. Windows computers are constantly talking

    D. Windows computers will not respond to idle scans

  • Question 367:

    You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

    A. Show outdated equipment so it can be replaced

    B. List weak points on their network

    C. Use attack as a launching point to penetrate deeper into the network

    D. Demonstrate that no system can be protected against DoS attacks

  • Question 368:

    Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test. The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

    A. False negatives

    B. False positives

    C. True negatives

    D. True positives

  • Question 369:

    In Linux, what is the smallest possible shellcode?

    A. 24 bytes

    B. 8 bytes

    C. 800 bytes

    D. 80 bytes

  • Question 370:

    Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

    A. Border Gateway Protocol

    B. Cisco Discovery Protocol

    C. Broadcast System Protocol

    D. Simple Network Management Protocol

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.