Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V9 Questions & Answers

  • Question 331:

    Subscriber Identity Module (SIM) is a removable component that contains essential information about the subscriber. Its main function entails authenticating the user of the cell phone to the network to gain access to subscribed services. SIM contains a 20-digit long Integrated Circuit Card identification (ICCID) number, identify the issuer identifier Number from the ICCID below.

    A. 89

    B. 44

    C. 245252

    D. 001451548

  • Question 332:

    Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data.

    A. True

    B. False

  • Question 333:

    Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.

    A. True

    B. False

  • Question 334:

    An Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the millisecond of computer clock times in a network of computers. Which of the following statement is true for NTP Stratum Levels?

    A. Stratum-0 servers are used on the network; they are not directly connected to computers which then operate as stratum-1 servers

    B. Stratum-1 time server is linked over a network path to a reliable source of UTC time such as GPS, WWV, or CDMA transmissions

    C. A stratum-2 server is directly linked (not over a network path) to a reliable source of UTC time such as GPS, WWV, or CDMA transmissions

    D. A stratum-3 server gets its time over a network link, via NTP, from a stratum-2 server, and so on

  • Question 335:

    Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server's root directory?

    A. Unvalidated input

    B. Parameter/form tampering

    C. Directory traversal

    D. Security misconfiguration

  • Question 336:

    What is the First Step required in preparing a computer for forensics investigation?

    A. Do not turn the computer off or on, run any programs, or attempt to access data on a computer

    B. Secure any relevant media

    C. Suspend automated document destruction and recycling policies that may pertain to any relevant media or users at Issue

    D. Identify the type of data you are seeking, the Information you are looking for, and the urgency level of the examination

  • Question 337:

    Digital evidence validation involves using a hashing algorithm utility to create a binary or hexadecimal number that represents the uniqueness of a data set, such as a disk drive or file.

    Which of the following hash algorithms produces a message digest that is 128 bits long?

    A. CRC-32

    B. MD5

    C. SHA-1

    D. SHA-512

  • Question 338:

    What is a chain of custody?

    A. A legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory

    B. It is a search warrant that is required for seizing evidence at a crime scene

    C. It Is a document that lists chain of windows process events

    D. Chain of custody refers to obtaining preemptive court order to restrict further damage of evidence in electronic seizures

  • Question 339:

    International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is also known as:

    A. Type Allocation Code (TAC)

    B. Device Origin Code (DOC)

    C. Manufacturer identification Code (MIC)

    D. Integrated Circuit Code (ICC)

  • Question 340:

    Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___________to transfer log messages in a clear text format.

    A. TCP

    B. FTP

    C. SMTP

    D. POP

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.