Exam Details

  • Exam Code
    :312-49V10
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1006 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V10 Questions & Answers

  • Question 651:

    Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:

    A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Currentversion \ProfileList

    B. HKEY_LOCAL_MACHlNE\SOFTWARE\Microsoft\Windows NT\CurrentVersion \NetworkList

    C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentsVersion \setup

    D. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule

  • Question 652:

    When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on

    A. True

    B. False

  • Question 653:

    During first responder procedure you should follow all laws while collecting the evidence, and contact a computer forensic examiner as soon as possible

    A. True

    B. False

  • Question 654:

    Injection flaws are web application vulnerabilities that allow untrusted data to be Interpreted and executed as part of a command or query. Attackers exploit injection flaws by constructing malicious commands or queries that result in data loss or corruption, lack of accountability, or denial of access. Which of the following injection flaws involves the injection of malicious code through a web application?

    A. SQL Injection

    B. Password brute force

    C. Nmap Scanning

    D. Footprinting

  • Question 655:

    Which one of the following is not a consideration in a forensic readiness planning checklist?

    A. Define the business states that need digital evidence

    B. Identify the potential evidence available

    C. Decide the procedure for securely collecting the evidence that meets the requirement fn a forensically sound manner

    D. Take permission from all employees of the organization

  • Question 656:

    Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

    A. Brute forcing attack

    B. Hybrid attack

    C. Syllable attack

    D. Rule-based attack

  • Question 657:

    Digital evidence is not fragile in nature.

    A. True

    B. False

  • Question 658:

    Computer security logs contain information about the events occurring within an organization's systems and networks. Which of the following security logs contains Logs of network and host-based security software?

    A. Operating System (OS) logs

    B. Application logs

    C. Security software logs

    D. Audit logs

  • Question 659:

    Which of the following is the certifying body of forensics labs that investigate criminal cases by analyzing evidence?

    A. The American Society of Crime Laboratory Directors (ASCLD)

    B. International Society of Forensics Laboratory (ISFL)

    C. The American Forensics Laboratory Society (AFLS)

    D. The American Forensics Laboratory for Computer Forensics (AFLCF)

  • Question 660:

    Which Is a Linux journaling file system?

    A. Ext3

    B. HFS

    C. FAT

    D. BFS

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.