Exam Details

  • Exam Code
    :312-49V10
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1006 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V10 Questions & Answers

  • Question 11:

    What do you call the process in which an attacker uses magnetic field over the digital media device to delete any previously stored data?

    A. Disk deletion

    B. Disk cleaning

    C. Disk degaussing

    D. Disk magnetization

  • Question 12:

    Which of the following processes is part of the dynamic malware analysis?

    A. Process Monitoring

    B. Malware disassembly

    C. Searching for the strings

    D. File fingerprinting

  • Question 13:

    Investigators can use the Type Allocation Code (TAC) to find the model and origin of a mobile device. Where is TAC located in mobile devices?

    A. International Mobile Equipment Identifier (IMEI)

    B. Integrated circuit card identifier (ICCID)

    C. International mobile subscriber identity (IMSI)

    D. Equipment Identity Register (EIR)

  • Question 14:

    Which command line tool is used to determine active network connections?

    A. netsh

    B. nbstat

    C. nslookup

    D. netstat

  • Question 15:

    Which of the following application password cracking tool can discover all password-protected items on a computer and decrypts them?

    A. TestDisk for Windows

    B. R-Studio

    C. Windows Password Recovery Bootdisk

    D. Passware Kit Forensic

  • Question 16:

    An investigator has found certain details after analysis of a mobile device. What can reveal the manufacturer information?

    A. Equipment Identity Register (EIR)

    B. Electronic Serial Number (ESN)

    C. International mobile subscriber identity (IMSI)

    D. Integrated circuit card identifier (ICCID)

  • Question 17:

    Which U.S. Federal law requires financial institutions that offer consumers financial products or services to protect their customers' private information?

    A. Payment Card Industry Data Security Standard (PCI DSS)

    B. Federal Information Security Management Act of 2002 (FISMA)

    C. Health insurance Portability and Accountability Act of 1996 (HIPAA)

    D. Gramm-Leach-Bliley Act (GLBA)

  • Question 18:

    Select the tool appropriate for examining the dynamically linked libraries of an application or malware.

    A. DependencyWalker

    B. SysAnalyzer

    C. PEiD

    D. ResourcesExtract

  • Question 19:

    Which of the following registry hive gives the configuration information about which application was used to open various files on the system?

    A. HKEY_CLASSES_ROOT

    B. HKEY_CURRENT_CONFIG

    C. HKEY_LOCAL_MACHINE

    D. HKEY_USERS

  • Question 20:

    CAN-SPAM act requires that you:

    A. Don't use deceptive subject lines

    B. Don't tell the recipients where you are located

    C. Don't identify the message as an ad

    D. Don't use true header information

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.