Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V9 Questions & Answers

  • Question 181:

    What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

    A. IAS account names and passwords

    B. Service account passwords in plain text

    C. Local store PKI Kerberos certificates

    D. Cached password hashes for the past 20 users

  • Question 182:

    Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?

    A. Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media

    B. Prepare the system for acquisition; Connect the target media; Copy the media; Secure the evidence

    C. Connect the target media; Delete the system for acquisition; Secure the evidence; Copy the media

    D. Secure the evidence; Prepare the system for acquisition; Connect the target media; Copy the media

  • Question 183:

    Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?

    A. Only FTP traffic can be hijacked

    B. Only an HTTPS session can be hijacked

    C. HTTP protocol does not maintain session

    D. Only DNS traffic can be hijacked

  • Question 184:

    You are working as Computer Forensics investigator and are called by the owner of an accounting firm to investigate possible computer abuse by one of the firm's employees. You meet with the owner of the firm and discover that the company has never published a policy stating that they reserve the right to inspect their computing assets at will. What do you do?

    A. Inform the owner that conducting an investigation without a policy is not a problem because the company is privately owned

    B. Inform the owner that conducting an investigation without a policy is a violation of the 4th amendment

    C. Inform the owner that conducting an investigation without a policy is a violation of the employees' expectation of privacy

    D. Inform the owner that conducting an investigation without a policy is not a problem because a policy is only necessary for government agencies

  • Question 185:

    Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately. Which organization coordinates computer crimes investigations throughout the United States?

    A. Internet Fraud Complaint Center

    B. Local or national office of the U.S. Secret Service

    C. National Infrastructure Protection Center

    D. CERT Coordination Center

  • Question 186:

    You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls (Select 2)

    A. 161

    B. 162

    C. 163

    D. 160

  • Question 187:

    When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

    A. Avoid over-saturation of wireless signals

    B. So that the access points will work on different requencies

    C. Avoid cross talk

    D. Multiple access points can be set up on the same channel without any issues

  • Question 188:

    You are assisting in the investigation of a possible Web Server hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a pornographic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

    A. ARP Poisoning

    B. DNS Poisoning

    C. HTTP redirect attack

    D. IP Spoofing

  • Question 189:

    A packet is sent to a router that does not have the packet destination address in its route table, how will the packet get to its properA packet is sent to a router that does not have the packet? destination address in its route table, how will the packet get to its proper destination?

    A. Border Gateway Protocol

    B. Root Internet servers

    C. Gateway of last resort

    D. Reverse DNS

  • Question 190:

    Why is it still possible to recover files that have been emptied from the Recycle Bin on a Windows computer?

    A. The data is still present until the original location of the file is used

    B. The data is moved to the Restore directory and is kept there indefinitely

    C. The data will reside in the L2 cache on a Windows computer until it is manually deleted

    D. It is not possible to recover data that has been emptied from the Recycle Bin

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.