Exam Details

  • Exam Code
    :312-49V8
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V8)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :180 Q&As
  • Last Updated
    :Apr 10, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V8 Questions & Answers

  • Question 151:

    During the seizure of digital evidence, the suspect can be allowed touch the computer system.

    A. True

    B. False

  • Question 152:

    Which of the following password cracking techniques works like a dictionary attack, but adds some numbers and symbols to the words from the dictionary and tries to crack the password?

    A. Brute forcing attack

    B. Hybrid attack

    C. Syllable attack

    D. Rule-based attack

  • Question 153:

    A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?

    A. Plaintext

    B. Single pipe character

    C. Multiple pipe characters

    D. HTML tags

  • Question 154:

    Who is responsible for the following tasks?

    A. Non-Laboratory Staff

    B. System administrators

    C. Local managers or other non-forensic staff

    D. Lawyers

  • Question 155:

    Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations he can use to recover the IMEI number?

    A. #*06*#

    B. *#06#

    C. #06r

    D. *1MEI#

  • Question 156:

    System software password cracking is defined as cracking the operating system and all other utilities that enable a computer to function

    A. True

    B. False

  • Question 157:

    Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?

    A. Substitution techniques

    B. Transform domain techniques

    C. Cover generation techniques

    D. Spread spectrum techniques

  • Question 158:

    The disk in the disk drive rotates at high speed, and heads in the disk drive are used only to read data.

    A. True

    B. False

  • Question 159:

    What is a bit-stream copy?

    A. Bit-Stream Copy is a bit-by-bit copy of the original storage medium and exact copy of the original disk

    B. A bit-stream image is the file that contains the NTFS files and folders of all the data on a disk or partition

    C. A bit-stream image is the file that contains the FAT32 files and folders of all the data on a disk or partition

    D. Creating a bit-stream image transfers only non-deleted files from the original disk to the image disk

  • Question 160:

    WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?

    A. RC4-CCMP

    B. RC4-TKIP

    C. AES-CCMP

    D. AES-TKIP

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.