Exam Details

  • Exam Code
    :312-49V10
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V10)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :1006 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V10 Questions & Answers

  • Question 711:

    Which of the following is not a part of the technical specification of the laboratory-based imaging system?

    A. High performance workstation PC

    B. Remote preview and imaging pod

    C. Anti-repudiation techniques

    D. very low image capture rate

  • Question 712:

    An intrusion detection system (IDS) gathers and analyzes information from within a computer or a network to identify any possible violations of security policy, including unauthorized access, as well as misuse.

    Which of the following intrusion detection systems audit events that occur on a specific host?

    A. Network-based intrusion detection

    B. Host-based intrusion detection

    C. Log file monitoring

    D. File integrity checking

  • Question 713:

    Networks are vulnerable to an attack which occurs due to overextension of bandwidth, bottlenecks, network data interception, etc.

    Which of the following network attacks refers to a process in which an attacker changes his or her IP address so that he or she appears to be someone else?

    A. IP address spoofing

    B. Man-in-the-middle attack

    C. Denial of Service attack

    D. Session sniffing

  • Question 714:

    LBA (Logical Block Address) addresses data by allotting a ___________to each sector of the hard disk.

    A. Sequential number

    B. Index number

    C. Operating system number

    D. Sector number

  • Question 715:

    Email spoofing refers to:

    A. The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source

    B. The criminal act of sending an illegitimate email, falsely claiming to be from a legitimate site in an attempt to acquire the user's personal or account information

    C. Sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address Is hosted to cause a denial-of-service attack

    D. A sudden spike of "Reply All" messages on an email distribution list, caused by one misdirected message

  • Question 716:

    Netstat is a tool for collecting Information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics.

    Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

    A. netstat -ano

    B. netstat -b

    C. netstat -r

    D. netstat -s

  • Question 717:

    The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a mobile phone by the manufacturer.

    A. 16-bit identifier

    B. 24-bit identifier

    C. 32-bit identifier

    D. 64-bit identifier

  • Question 718:

    Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.

    Identify the attack referred.

    A. Directory traversal

    B. SQL Injection

    C. XSS attack

    D. File injection

  • Question 719:

    Data acquisition system is a combination of tools or processes used to gather, analyze and record Information about some phenomenon. Different data acquisition system are used depends on the location, speed, cost. etc. Serial communication data acquisition system is used when the actual location of the data is at some distance from the computer. Which of the following communication standard is used in serial communication data acquisition system?

    A. RS422

    B. RS423

    C. RS232

    D. RS231

  • Question 720:

    FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported?

    A. 1 terabytes

    B. 2 terabytes

    C. 3 terabytes

    D. 4 terabytes

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V10 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.