EC-Council 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) Online Training
EC-Council 312-49v10 Online Training
The questions for 312-49v10 were last updated at Dec 25,2024.
- Exam Code: 312-49v10
- Exam Name: Computer Hacking Forensic Investigator (CHFI-v10)
- Certification Provider: EC-Council
- Latest update: Dec 25,2024
You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers.
What type of firewall must you implement to abide by this policy?
- A . Packet filtering firewall
- B . Circuit-level proxy firewall
- C . Application-level proxy firewall
- D . Stateful firewall
The newer Macintosh Operating System is based on:
- A . OS/2
- B . BSD Unix
- C . Linux
- D . Microsoft Windows
If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?
- A . true
- B . false
The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company’s intranet, network or Virtual Private Network (VPN) and will allow the company’s investigators to monitor, search and retrieve information stored within the network.
- A . Right to work
- B . Right of free speech
- C . Right to Internet Access
- D . Right of Privacy
Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response.
In what state are these ports?
- A . Closed
- B . Open
- C . Stealth
- D . Filtered
You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a “simple backup copy” of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a “simple backup copy” will not provide deleted files or recover file fragments.
What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?
- A . Bit-stream Copy
- B . Robust Copy
- C . Full backup Copy
- D . Incremental Backup Copy
Software firewalls work at which layer of the OSI model?
- A . Application
- B . Network
- C . Transport
- D . Data Link
Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server.
Why will Jonathan not succeed?
- A . Only an HTTPS session can be hijacked
- B . HTTP protocol does not maintain session
- C . Only FTP traffic can be hijacked
- D . Only DNS traffic can be hijacked
The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?
- A . Detection
- B . Hearsay
- C . Spoliation
- D . Discovery
Which response organization tracks hoaxes as well as viruses?
- A . NIPC
- B . FEDCIRC
- C . CERT
- D . CIAC