Exam Details

  • Exam Code
    :312-49
  • Exam Name
    :ECCouncil Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 11, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49 Questions & Answers

  • Question 501:

    You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab?

    A. make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab

    B. make an MD5 hash of the evidence and compare it to the standard database developed by NIST

    C. there is no reason to worry about this possible claim because state labs are certified

    D. sign a statement attesting that the evidence is the same as it was when it entered the lab

  • Question 502:

    E-mail logs contain which of the following information to help you in your investigation? (Choose four.)

    A. user account that was used to send the account

    B. attachments sent with the e-mail message

    C. unique message identifier

    D. contents of the e-mail message

    E. date and time the message was sent

  • Question 503:

    You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation. Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case?

    A. All forms should be placed in an approved secure container because they are now primary evidence in the case.

    B. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.

    C. The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.

    D. All forms should be placed in the report file because they are now primary evidence in the case.

  • Question 504:

    The MD5 program is used to:

    A. wipe magnetic media before recycling it

    B. make directories on an evidence disk

    C. view graphics files on an evidence drive

    D. verify that a disk is not altered when you examine it

  • Question 505:

    Which is a standard procedure to perform during all computer forensics investigations?

    A. with the hard drive removed from the suspect PC, check the date and time in the system's CMOS

    B. with the hard drive in the suspect PC, check the date and time in the File Allocation Table

    C. with the hard drive removed from the suspect PC, check the date and time in the system's RAM

    D. with the hard drive in the suspect PC, check the date and time in the system's CMOS

  • Question 506:

    What does the acronym POST mean as it relates to a PC?

    A. Primary Operations Short Test

    B. PowerOn Self Test

    C. Pre Operational Situation Test

    D. Primary Operating System Test

  • Question 507:

    Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?

    A. bench warrant

    B. wire tap

    C. subpoena

    D. search warrant

  • Question 508:

    It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?

    A. by law, three

    B. quite a few

    C. only one

    D. at least two

  • Question 509:

    With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________.

    A. 0

    B. 10

    C. 100

    D. 1

  • Question 510:

    When examining the log files from a Windows IIS Web Server, how often is a new log file created?

    A. the same log is used at all times

    B. a new log file is created everyday

    C. a new log file is created each week

    D. a new log is created each time the Web Server is started

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.