Exam Details

  • Exam Code
    :312-49V10
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1006 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V10 Questions & Answers

  • Question 231:

    Which of the following information is displayed when Netstat is used with -ano switch?

    A. Ethernet statistics

    B. Contents of IP routing table

    C. Details of routing table

    D. Details of TCP and UDP connections

  • Question 232:

    Steve, a forensic investigator, was asked to investigate an email incident in his organization. The organization has Microsoft Exchange Server deployed for email communications. Which among the following files will Steve check to analyze message headers, message text, and standard attachments?

    A. PUB.EDB

    B. PRIV.EDB

    C. PUB.STM

    D. PRIV.STM

  • Question 233:

    Which of these Windows utility help you to repair logical file system errors?

    A. Resource Monitor

    B. Disk cleanup

    C. Disk defragmenter

    D. CHKDSK

  • Question 234:

    Identify the term that refers to individuals who, by virtue of their knowledge and expertise, express an independent opinion on a matter related to a case based on the information that is provided.

    A. Expert Witness

    B. Evidence Examiner

    C. Forensic Examiner

    D. Defense Witness

  • Question 235:

    In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?

    A. Chosen-message attack

    B. Known-cover attack

    C. Known-message attack

    D. Known-stego attack

  • Question 236:

    Which ISO Standard enables laboratories to demonstrate that they comply with quality assurance and provide valid results?

    A. ISO/IEC 16025

    B. ISO/IEC 18025

    C. ISO/IEC 19025

    D. ISO/IEC 17025

  • Question 237:

    Which type of attack is possible when attackers know some credible information about the victim's password, such as the password length, algorithms involved, or the strings and characters used in its creation?

    A. Rule-Based Attack

    B. Brute-Forcing Attack

    C. Dictionary Attack

    D. Hybrid Password Guessing Attack

  • Question 238:

    Which of the following statements is true regarding SMTP Server?

    A. SMTP Server breaks the recipient's address into Recipient's name and his/her designation before passing it to the DNS Server

    B. SMTP Server breaks the recipient's address into Recipient's name and recipient's address before passing it to the DNS Server

    C. SMTP Server breaks the recipient's address into Recipient's name and domain name before passing it to the DNS Server

    D. SMTP Server breaks the recipient's address into Recipient's name and his/her initial before passing it to the DNS Server

  • Question 239:

    What is the role of Alloc.c in Apache core?

    A. It handles allocation of resource pools

    B. It is useful for reading and handling of the configuration files

    C. It takes care of all the data exchange and socket connections between the client and the server

    D. It handles server start-ups and timeouts

  • Question 240:

    Robert, a cloud architect, received a huge bill from the cloud service provider, which usually doesn't happen. After analyzing the bill, he found that the cloud resource consumption was very high. He then examined the cloud server and discovered that a malicious code was running on the server, which was generating huge but harmless traffic from the server. This means that the server has been compromised by an attacker with the sole intention to hurt the cloud customer financially. Which attack is described in the above scenario?

    A. XSS Attack

    B. DDoS Attack (Distributed Denial of Service)

    C. Man-in-the-cloud Attack

    D. EDoS Attack (Economic Denial of Service)

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.