Exam Details

  • Exam Code
    :312-49V10
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1006 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V10 Questions & Answers

  • Question 151:

    Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?

    A. Ad hoc associations

    B. Client mis-association

    C. MAC spoofing

    D. Rogue access points

  • Question 152:

    Who is responsible for the following tasks?

    Secure the scene and ensure that is maintained in a secure state until the Forensic Team advises

    Make notes about the scene that will eventually be handed over to the Forensic Team

    A. Non-forensics staff

    B. Lawyers

    C. System administrators

    D. Local managers or other non-forensic staff

  • Question 153:

    Brian needs to acquire data from RAID storage. Which of the following acquisition methods is recommended to retrieve only the data relevant to the investigation?

    A. Static Acquisition

    B. Sparse or Logical Acquisition

    C. Bit-stream disk-to-disk Acquisition

    D. Bit-by-bit Acquisition

  • Question 154:

    Which of the following stages in a Linux boot process involve initialization of the system's hardware?

    A. BIOS Stage

    B. Bootloader Stage

    C. BootROM Stage

    D. Kernel Stage

  • Question 155:

    What is the capacity of Recycle bin in a system running on Windows Vista?

    A. 2.99GB

    B. 3.99GB

    C. Unlimited

    D. 10% of the partition space

  • Question 156:

    Which of the following tool captures and allows you to interactively browse the traffic on a network?

    A. Security Task Manager

    B. Wireshark

    C. ThumbsDisplay

    D. RegScanner

  • Question 157:

    Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?

    A. Dictionary attack

    B. Brute force attack

    C. Rule-based attack

    D. Man in the middle attack

  • Question 158:

    Which US law does the interstate or international transportation and receiving of child pornography fall under?

    A. §18. U.S.C. 1466A

    B. §18. U.S.C 252

    C. §18. U.S.C 146A

    D. §18. U.S.C 2252

  • Question 159:

    Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?

    A. Data collection

    B. Secure the evidence

    C. First response

    D. Data analysis

  • Question 160:

    Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?

    A. Shortcut Files

    B. Virtual files

    C. Prefetch Files

    D. Image Files

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.