Exam Details

  • Exam Code
    :312-49V8
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V8)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :180 Q&As
  • Last Updated
    :Apr 10, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V8 Questions & Answers

  • Question 131:

    Data files from original evidence should be used for forensics analysis

    A. True

    B. False

  • Question 132:

    Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and their

    variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.

    Identify the attack referred.

    A. Directory traversal

    B. SQL Injection

    C. XSS attack

    D. File injection

  • Question 133:

    Which of the following approaches checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

    A. Graph-based approach

    B. Neural network-based approach

    C. Rule-based approach

    D. Automated field correlation approach

  • Question 134:

    Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.

    A. True

    B. False

  • Question 135:

    Which of the following would you consider an aspect of organizational security, especially focusing on IT security?

    A. Biometric information security

    B. Security from frauds

    C. Application security

    D. Information copyright security

  • Question 136:

    Which of the following statements is incorrect when preserving digital evidence?

    A. Document the actions and changes that you observe in the monitor, computer, printer, or in other peripherals

    B. Verily if the monitor is in on, off, or in sleep mode

    C. Remove the power cable depending on the power state of the computer i.e., in on. off, or in sleep mode

    D. Turn on the computer and extract Windows event viewer log files

  • Question 137:

    Data acquisition system is a combination of tools or processes used to gather, analyze and record Information about some phenomenon. Different data acquisition system are used depends on the location, speed, cost. etc. Serial communication data acquisition system is used when the actual location of the data is at some distance from the computer. Which of the following communication standard is used in serial communication data acquisition system?

    A. RS422

    B. RS423

    C. RS232

    D. RS231

  • Question 138:

    Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?

    A. Rainbow tables

    B. Hash tables

    C. Master file tables

    D. Database tables

  • Question 139:

    Jason, a renowned forensic investigator, is investigating a network attack that resulted in the compromise of several systems in a reputed multinational's network. He started Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets travelling across the network belonged to a non-company configured IP. Which of the following attack Jason can infer from his findings?

    A. DNS Poisoning

    B. Cookie Poisoning Attack

    C. DNS Redirection

    D. Session poisoning

  • Question 140:

    Web applications provide an Interface between end users and web servers through a set of web pages that are generated at the server-end or contain script code to be executed dynamically within the client Web browser.

    A. True

    B. False

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.