Exam Details

  • Exam Code
    :312-49V10
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1006 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V10 Questions & Answers

  • Question 261:

    Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?

    A. Server storage archives are the server information and settings stored on a local system, whereas the local archives are the local email client information stored on the mail server

    B. It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers

    C. Local archives should be stored together with the server storage archives in order to be admissible in a court of law

    D. Local archives do not have evidentiary value as the email client may alter the message data

  • Question 262:

    Which of the following techniques delete the files permanently?

    A. Steganography

    B. Artifact Wiping

    C. Data Hiding

    D. Trail obfuscation

  • Question 263:

    Which among the following laws emphasizes the need for each Federal agency to develop, document, and implement an organization-wide program to provide information security for the information systems that support its operations and assets?

    A. FISMA

    B. HIPAA

    C. GLBA

    D. SOX

  • Question 264:

    Which of the following malware analysis involves executing the malware code to know how the code interacts with the host system and its impact on the system?

    A. Primary Malware Analysis

    B. Static Malware Analysis

    C. Dynamic Malware Analysis

    D. Secondary Malware Analysis

  • Question 265:

    Which component in the hard disk moves over the platter to read and write information?

    A. Actuator

    B. Spindle

    C. Actuator Axis

    D. Head

  • Question 266:

    Which tool allows dumping the contents of process memory without stopping the process?

    A. psdump.exe

    B. pmdump.exe

    C. processdump.exe

    D. pdump.exe

  • Question 267:

    Which of the following is NOT a graphics file?

    A. Picture1.tga

    B. Picture2.bmp

    C. Picture3.nfo

    D. Picture4.psd

  • Question 268:

    Why is it still possible to recover files that have been emptied from the Recycle Bin on a Windows computer?

    A. The data is still present until the original location of the file is used

    B. The data is moved to the Restore directory and is kept there indefinitely

    C. The data will reside in the L2 cache on a Windows computer until it is manually deleted

    D. It is not possible to recover data that has been emptied from the Recycle Bin

  • Question 269:

    If you discover a criminal act while investigating a corporate policy abuse, it becomes a public-sector investigation and should be referred to law enforcement?

    A. True

    B. False

  • Question 270:

    You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company ITYou have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company? IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?

    A. Network

    B. Transport

    C. Data Link

    D. Session

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.