Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V9 Questions & Answers

  • Question 321:

    A rogue/unauthorized access point is one that Is not authorized for operation by a particular firm or network

    A. True

    B. False

  • Question 322:

    The need for computer forensics is highlighted by an exponential increase in the number of cybercrimes and litigations where large organizations were involved. Computer forensics plays an important role in tracking the cyber criminals. The main role of computer forensics is to:

    A. Maximize the investigative potential by maximizing the costs

    B. Harden organization perimeter security

    C. Document monitoring processes of employees of the organization

    D. Extract, process, and interpret the factual evidence so that it proves the attacker's actions in the court

  • Question 323:

    You have been given the task to investigate web attacks on a Windows-based server.

    Which of the following commands will you use to look at which sessions the machine has opened with other systems?

    A. Net sessions

    B. Net use

    C. Net config

    D. Net share

  • Question 324:

    Email archiving is a systematic approach to save and protect the data contained in emails so that it can be accessed fast at a later date. There are two main archive types, namely Local Archive and Server Storage Archive. Which of the following statements is correct while dealing with local archives?

    A. It is difficult to deal with the webmail as there is no offline archive in most cases. So consult your counsel on the case as to the best way to approach and gain access to the required data on servers

    B. Local archives do not have evidentiary value as the email client may alter the message data

    C. Local archives should be stored together with the server storage archives in order to be admissible in a court of law

    D. Server storage archives are the server information and settings stored on a local system whereas the local archives are the local email client information stored on the mail server

  • Question 325:

    An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes).

    Which property of the image shows you the number of colors available for each pixel in an image?

    A. Pixel

    B. Bit Depth

    C. File Formats

    D. Image File Size

  • Question 326:

    When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.

    A. 4902

    B. 3902

    C. 4904

    D. 3904

  • Question 327:

    Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, "X" represents the _________.

    A. Drive name

    B. Sequential number

    C. Original file name's extension

    D. Original file name

  • Question 328:

    What is a SCSI (Small Computer System Interface)?

    A. A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners

    B. A standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices

    C. A "plug-and-play" interface, which allows a device to be added without an adapter card and without rebooting the computer

    D. A point-to-point serial bi-directional interface for transmitting data between computer devices at data rates of up to 4 Gbps

  • Question 329:

    The Apache server saves diagnostic information and error messages that it encounters while processing requests. The default path of this file is usr/local/apache/logs/error.log in Linux. Identify the Apache error log from the following logs.

    A. 127.0.0.1 - frank [10/Oct/2000:13:55:36-0700] "GET /apache_pb.grf HTTP/1.0" 200

    B. [Wed Oct 11 14:32:52 2000] [error] [client 127.0.0.1] client denied by server configuration: /export/ home/live/ap/htdocs/test

    C. http://victim.com/scripts/..%c0%af./..%c0%af./..%c0%af./..%c0%af./..%c0%af./..%c0%af./.. %c0%af./..%c0%af./../winnt/system32/cmd.exe?/c+di r+c:\wintt\system32\Logfiles\W3SVC1

    D. 127.0.0.1 --[10/Apr/2007:10:39:11 +0300] ] [error] "GET /apache_pb.gif HTTP/1.0' 200

  • Question 330:

    File deletion is a way of removing a file from a computer's file system. What happens when a file is deleted in windows7?

    A. The last letter of a file name is replaced by a hex byte code E5h

    B. The operating system marks the file's name in the MFT with a special character that indicates that the file has been deleted

    C. Corresponding clusters in FAT are marked as used

    D. The computer looks at the clusters occupied by that file and does not avails space to store a new file

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.