Exam Details

  • Exam Code
    :312-49V10
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1006 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V10 Questions & Answers

  • Question 431:

    If you come across a sheepdip machine at your client site, what would you infer?

    A. A sheepdip coordinates several honeypots

    B. A sheepdip computer is another name for a honeypot

    C. A sheepdip computer is used only for virus-checking.

    D. A sheepdip computer defers a denial of service attack

  • Question 432:

    You are working as a computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact local law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject computer. You inform the officer that you will not be able to comply with thatnetwork sniffer on your network and monitor all traffic to the subject? computer. You inform the officer that you will not be able to comply with that request because doing so would:

    A. Violate your contract

    B. Cause network congestion

    C. Make you an agent of law enforcement

    D. Write information to the subject hard driveWrite information to the subject? hard drive

  • Question 433:

    Before you are called to testify as an expert, what must an attorney do first?

    A. engage in damage control

    B. prove that the tools you used to conduct your examination are perfect

    C. read your curriculum vitae to the jury

    D. qualify you as an expert witness

  • Question 434:

    You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

    A. IBM Methodology

    B. Microsoft Methodology

    C. Google Methodology

    D. LPT Methodology

  • Question 435:

    What type of analysis helps to identify the time and sequence of events in an investigation?

    A. Time-based

    B. Functional

    C. Relational

    D. Temporal

  • Question 436:

    What does ICMP Type 3/Code 13 mean?

    A. Administratively Blocked

    B. Host Unreachable

    C. Protocol Unreachable

    D. Port Unreachable

  • Question 437:

    Cylie is investigating a network breach at a state organization in Florida. She discovers that the intruders were able to gain access into the company firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into thecompany? firewalls by overloading them with IP packets. Cylie then discovers through her investigation that the intruders hacked into the company phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the companycompany? phone system and used the hard drives on their PBX system to store shared music files. What would this attack on the company? PBX system be called?

    A. Phreaking

    B. Squatting

    C. Crunching

    D. Pretexting

  • Question 438:

    This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court.

    A. Civil litigation testimony

    B. Expert testimony

    C. Victim advocate testimony

    D. Technical testimony

  • Question 439:

    You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive. org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found?

    A. Web bug

    B. CGI code

    C. Trojan.downloader

    D. Blind bug

  • Question 440:

    When operating systems mark a cluster as used but not allocated, the cluster is considered as _________

    A. Corrupt

    B. Bad

    C. Lost

    D. Unallocated

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.