Exam Details

  • Exam Code
    :312-49V10
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1006 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V10 Questions & Answers

  • Question 411:

    To calculate the number of bytes on a disk, the formula is: CHS**

    A. number of circles x number of halves x number of sides x 512 bytes per sector

    B. number of cylinders x number of halves x number of shims x 512 bytes per sector

    C. number of cells x number of heads x number of sides x 512 bytes per sector

    D. number of cylinders x number of heads x number of sides x 512 bytes per sector

  • Question 412:

    The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be?

    A. Any data not yet flushed to the system will be lost

    B. All running processes will be lost

    C. The /tmp directory will be flushed

    D. Power interruption will corrupt the pagefile

  • Question 413:

    You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive footprinting against their Web servers. What tool should you use?

    A. Dig

    B. Ping sweep

    C. Netcraft

    D. Nmap

  • Question 414:

    What are the security risks of running a "repair" installation for Windows XP?

    A. Pressing Shift+F1 gives the user administrative rights

    B. Pressing Ctrl+F10 gives the user administrative rights

    C. There are no security risks when running the "repair" installation for Windows XP

    D. Pressing Shift+F10 gives the user administrative rights

  • Question 415:

    In Microsoft file structures, sectors are grouped together to form:

    A. Clusters

    B. Drives

    C. Bitstreams

    D. Partitions

  • Question 416:

    When investigating a Windows System, it is important to view the contents of the page or swap file because:

    A. Windows stores all of the systems configuration information in this file

    B. This is file that windows use to communicate directly with Registry

    C. A Large volume of data can exist within the swap file of which the computer user has no knowledge

    D. This is the file that windows use to store the history of the last 100 commands that were run from the command line

  • Question 417:

    Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

    A. Windows computers will not respond to idle scans

    B. Linux/Unix computers are easier to compromise

    C. Windows computers are constantly talking

    D. Linux/Unix computers are constantly talking

  • Question 418:

    Jones had been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the system for a period of three weeks. However law enforcement agencies were recording his every activity and this was later presented as evidence. The organization had used a virtual environment to trap Jones. What is a virtual environment?

    A. A system using Trojaned commands

    B. A honeypot that traps hackers

    C. An environment set up after the user logs in

    D. An environment set up before an user logs in

  • Question 419:

    Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

    A. Filtered

    B. Closed

    C. Open

    D. Stealth

  • Question 420:

    When investigating a potential e-mail crime, what is your first step in the investigation?

    A. Trace the IP address to its origin

    B. Write a report

    C. Determine whether a crime was actually committed

    D. Recover the evidence

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.