Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :EC-Council Certified Computer Hacking Forensic Investigator (V9)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :531 Q&As
  • Last Updated
    :Apr 14, 2025

EC-COUNCIL EC-COUNCIL Certifications 312-49V9 Questions & Answers

  • Question 401:

    File signature analysis involves collecting information from the __________ of a file to determine the type and function of the file

    A. First 10 bytes

    B. First 20 bytes

    C. First 30 bytes

    D. First 40 bytes

  • Question 402:

    Why is it Important to consider health and safety factors in the work carried out at all stages of the forensic process conducted by the forensic analysts?

    A. This is to protect the staff and preserve any fingerprints that may need to be recovered at a later date

    B. All forensic teams should wear protective latex gloves which makes them look professional and cool

    C. Local law enforcement agencies compel them to wear latest gloves

    D. It is a part of ANSI 346 forensics standard

  • Question 403:

    Which of the following is not an example of a cyber-crime?

    A. Fraud achieved by the manipulation of the computer records

    B. Firing an employee for misconduct

    C. Deliberate circumvention of the computer security systems

    D. Intellectual property theft, including software piracy

  • Question 404:

    TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication protocol used to connect different hosts in the Internet. It contains four layers, namely the network interface layer. Internet layer, transport layer, and application layer.

    Which of the following protocols works under the transport layer of TCP/IP?

    A. UDP

    B. HTTP

    C. FTP

    D. SNMP

  • Question 405:

    Which of the following would you consider an aspect of organizational security, especially focusing on IT security?

    A. Biometric information security

    B. Security from frauds

    C. Application security

    D. Information copyright security

  • Question 406:

    Buffer Overflow occurs when an application writes more data to a block of memory, or buffer, than the buffer is allocated to hold. Buffer overflow attacks allow an attacker to modify the _______________in order to control the process execution, crash the process and modify internal variables.

    A. Target process's address space

    B. Target remote access

    C. Target rainbow table

    D. Target SAM file

  • Question 407:

    The evolution of web services and their increasing use in business offers new attack vectors in an application framework. Web services are based on XML protocols such as web Services Definition Language (WSDL) for describing the connection points, Universal Description, Discovery, and Integration (UDDI) for the description and discovery of Web services and Simple Object Access Protocol (SOAP) for communication between Web services that are vulnerable to various web application threats. Which of the following layer in web services stack is vulnerable to fault code leaks?

    A. Presentation Layer

    B. Security Layer

    C. Discovery Layer

    D. Access Layer

  • Question 408:

    At the time of evidence transfer, both sender and receiver need to give the information about date and time of transfer in the chain of custody record.

    A. True

    B. False

  • Question 409:

    Computer forensics report provides detailed information on complete computer forensics investigation process. It should explain how the incident occurred, provide technical details of the incident and should be clear to understand. Which of the following attributes of a forensics report can render it inadmissible in a court of law?

    A. It includes metadata about the incident

    B. It includes relevant extracts referred to In the report that support analysis or conclusions

    C. It is based on logical assumptions about the incident timeline

    D. It maintains a single document style throughout the text

  • Question 410:

    A swap file is a space on a hard disk used as the virtual memory extension of a computer's RAM. Where is the hidden swap file in Windows located?

    A. C:\pagefile.sys

    B. C:\hiberfil.sys

    C. C:\config.sys

    D. C:\ALCSetup.log

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.