Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V9 Questions & Answers

  • Question 121:

    The newer Macintosh Operating System (MacOS X) is based on:

    A. Microsoft Windows

    B. OS/2

    C. BSD Unix

    D. Linux

  • Question 122:

    James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

    A. Fraggle

    B. Smurf

    C. SYN flood

    D. Trinoo

  • Question 123:

    Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?

    A. DFS Encryption

    B. EFS Encryption

    C. SDW Encryption

    D. IPS Encryption

  • Question 124:

    How many sectors will a 125 KB file use in a FAT32 file system?

    A. 32

    B. 16

    C. 250

    D. 25

  • Question 125:

    In General, __________________ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.

    A. Network Forensics

    B. Data Recovery

    C. Disaster Recovery

    D. Computer Forensics

  • Question 126:

    George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

    A. Nessus cannot perform wireless testing

    B. Nessus is too loud

    C. There are no ways of performing a "stealthy" wireless scan

    D. Nessus is not a network scanner

  • Question 127:

    Using Linux to carry out a forensics investigation, what would the following command accomplish? dd if=/ usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror

    A. Search for disk errors within an image file

    B. Backup a disk to an image file

    C. Copy a partition to an image file

    D. Restore a disk from an image file

  • Question 128:

    You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

    A. Oligomorhic

    B. Transmorphic

    C. Polymorphic

    D. Metamorphic

  • Question 129:

    When reviewing web logs, you see an entry for resource not found in the HTTP status code filed. What is the actual error code that you would see in the log for resource not found?

    A. 202

    B. 404

    C. 505

    D. 909

  • Question 130:

    When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers?

    A. Time-Sync Protocol

    B. SyncTime Service

    C. Network Time Protocol

    D. Universal Time Set

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.