EC-Council 312-49v9 ECCouncil Computer Hacking Forensic Investigator (V9) Online Training
EC-Council 312-49v9 Online Training
The questions for 312-49v9 were last updated at Nov 19,2024.
- Exam Code: 312-49v9
- Exam Name: ECCouncil Computer Hacking Forensic Investigator (V9)
- Certification Provider: EC-Council
- Latest update: Nov 19,2024
What does mactime, an essential part of the coroner’s toolkit do?
- A . It traverses the file system and produces a listing of all files based on the modification, access and change timestamps
- B . It can recover deleted file space and search it for data. However, it does not allow the investigator to preview them
- C . The tools scans for i-node information, which is used by other tools in the tool kit
- D . It is too specific to the MAC OS and forms a core component of the toolkit
Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities.
Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?
- A . Closed
- B . Open
- C . Stealth
- D . Filtered
Windows identifies which application to open a file with by examining which of the following?
- A . The File extension
- B . The file attributes
- C . The file Signature at the end of the file
- D . The file signature at the beginning of the file
When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.
- A . Hard Drive Failure
- B . Scope Creep
- C . Unauthorized expenses
- D . Overzealous marketing
After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.
What countermeasures could he take to prevent DDoS attacks?
- A . Enable direct broadcasts
- B . Disable direct broadcasts
- C . Disable BGP
- D . Enable BGP
Which of the following is NOT a graphics file?
- A . Picture1.tga
- B . Picture2.bmp
- C . Picture3.nfo
- D . Picture4.psd
The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.
- A . Gramm-Leach-Bliley Act
- B . Sarbanes-Oxley 2002
- C . California SB 1386
- D . HIPAA
The use of warning banners helps a company avoid litigation by overcoming an employee assumed __________________________. When connecting to the company’s intranet, network or Virtual Private Network (VPN) and will allow the company’s investigators to monitor, search and retrieve information stored within the network.
- A . Right to work
- B . Right of free speech
- C . Right to Internet Access
- D . Right of Privacy
You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case .
How would you permanently erase the data on the hard disk?
- A . Throw the hard disk into the fire
- B . Run the powerful magnets over the hard disk
- C . Format the hard disk multiple times using a low level disk utility
- D . Overwrite the contents of the hard disk with Junk data
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives.
One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:
- A . HKEY_LOCAL_MACHINEhardwarewindowsstart
- B . HKEY_LOCAL_USERSSoftwareMicrosoftoldVersionLoad
- C . HKEY_CURRENT_USERMicrosoftDefault
- D . HKEY_LOCAL_MACHINESoftwareMicrosoftCurrentVersionRun