Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V9 Questions & Answers

  • Question 231:

    The objective of this act was to protect consumers personal financial information held by financial institutions and their service providers.

    A. HIPAA

    B. Sarbanes-Oxley 2002

    C. California SB 1386

    D. Gramm-Leach-Bliley Act

  • Question 232:

    Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?

    A. Typography

    B. Steganalysis

    C. Picture encoding

    D. Steganography

  • Question 233:

    Given the drive dimensions as follows and assuming a sector has 512 bytes, what is the capacity of the described hard drive? 22,164 cylinders/disk 80 heads/cylinder 63 sectors/track

    A. 53.26 GB

    B. 57.19 GB

    C. 11.17 GB

    D. 10 GB

  • Question 234:

    What type of equipment would a forensics investigator store in a StrongHold bag?

    A. PDAPDA?

    B. Backup tapes

    C. Hard drives

    D. Wireless cards

  • Question 235:

    Which is a standard procedure to perform during all computer forensics investigations?

    A. With the hard drive in the suspect PC, check the date and time in the system CMOSWith the hard drive in the suspect PC, check the date and time in the system? CMOS

    B. With the hard drive removed from the suspect PC, check the date and time in the system CMOSWith the hard drive removed from the suspect PC, check the date and time in the system? CMOS

    C. With the hard drive in the suspect PC, check the date and time in the File Allocation Table

    D. With the hard drive removed from the suspect PC, check the date and time in the system RAMWith the hard drive removed from the suspect PC, check the date and time in the system? RAM

  • Question 236:

    Paraben Lockdown device uses which operating system to write hard drive data?Paraben? Lockdown device uses which operating system to write hard drive data?

    A. Mac OS

    B. Red Hat

    C. Unix

    D. Windows

  • Question 237:

    A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

    A. Searching for evidence themselves would not have any ill effects

    B. Searching could possibly crash the machine or device

    C. Searching creates cache files, which would hinder the investigation

    D. Searching can change date/time stamps

  • Question 238:

    A forensics investigator is searching the hard drive of a computer for files that were recently moved to the Recycle Bin. He searches for files in C:\RECYCLED using a command line tool but does not find anything. What is the reason for this?

    A. He should search in C:\Windows\System32\RECYCLED folder

    B. The Recycle Bin does not exist on the hard drive

    C. The files are hidden and he must use switch to view themThe files are hidden and he must use ? switch to view them

    D. Only FAT system contains RECYCLED folder and not NTFS

  • Question 239:

    Travis, a computer forensics investigator, is finishing up a case he has been working on for over a month involving copyright infringement and embezzlement. His last task is to prepare an investigative report for the president of the company he has been working for. Travis must submit a hard copy and an electronic copy to this president. In what electronic format should Travis send this report?

    A. TIFF-8

    B. DOC

    C. WPD

    D. PDF

  • Question 240:

    What hashing method is used to password protect Blackberry devices?

    A. AES

    B. RC5

    C. MD5

    D. SHA-1

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.