Exam Details

  • Exam Code
    :312-49V8
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V8)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :180 Q&As
  • Last Updated
    :Apr 10, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V8 Questions & Answers

  • Question 71:

    Hash injection attack allows attackers to inject a compromised hash into a local session and use the hash to validate network resources.

    A. True

    B. False

  • Question 72:

    A computer forensic report is a report which provides detailed information on the complete forensics investigation process.

    A. True

    B. False

  • Question 73:

    Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications.

    Which data compression technique maintains data integrity?

    A. Lossless compression

    B. Lossy compression

    C. Speech encoding compression

    D. Lossy video compression

  • Question 74:

    Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.

    A. True

    B. False

  • Question 75:

    In what circumstances would you conduct searches without a warrant?

    A. When destruction of evidence is imminent, a warrantless seizure of that evidence is justified if there is probable cause to believe that the item seized constitutes evidence of criminal activity

    B. Agents may search a place or object without a warrant if he suspect the crime was committed C. A search warrant is not required if the crime involves Denial-Of-Service attack over the Internet

    D. Law enforcement agencies located in California under section SB 567 are authorized to seize computers without warrant under all circumstances

  • Question 76:

    Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame.

    A. 8-bit

    B. 16-bit

    C. 24-bit

    D. 32-bit

  • Question 77:

    Which is not a part of environmental conditions of a forensics lab?

    A. Large dimensions of the room

    B. Good cooling system to overcome excess heat generated by the work station

    C. Allocation of workstations as per the room dimensions

    D. Open windows facing the public road

  • Question 78:

    An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the millisecond of computer clock times in a network of computers. Which of the following statement is true for NTP Stratum Levels?

    A. Stratum-0 servers are used on the network; they are not directly connected to computers which then operate as stratum-1 servers

    B. Stratum-1 time server is linked over a network path to a reliable source of UTC time such as GPS, WWV, or CDMA transmissions

    C. A stratum-2 server is directly linked (not over a network path) to a reliable source of UTC time such as GPS, WWV, or CDMA transmissions

    D. A stratum-3 server gets its time over a network link, via NTP, from a stratum-2 server, and so on

  • Question 79:

    Attacker uses vulnerabilities in the authentication or session management functions such as exposed accounts, session IDs, logout, password management, timeouts, remember me. secret question, account update etc. to impersonate users, if a user simply closes the browser without logging out from sites accessed through a public computer, attacker can use the same browser later and exploit the user's privileges. Which of the following vulnerability/exploitation is referred above?

    A. Session ID in URLs

    B. Timeout Exploitation

    C. I/O exploitation

    D. Password Exploitation

  • Question 80:

    In an echo data hiding technique, the secret message is embedded into a __________as an echo.

    A. Cover audio signal

    B. Phase spectrum of a digital signal

    C. Pseudo-random signal

    D. Pseudo- spectrum signal

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V8 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.