EC-Council 312-49v9 ECCouncil Computer Hacking Forensic Investigator (V9) Online Training
EC-Council 312-49v9 Online Training
The questions for 312-49v9 were last updated at Oct 29,2024.
- Exam Code: 312-49v9
- Exam Name: ECCouncil Computer Hacking Forensic Investigator (V9)
- Certification Provider: EC-Council
- Latest update: Oct 29,2024
One way to identify the presence of hidden partitions on a suspect’s hard drive is to:
- A . Add up the total size of all known partitions and compare it to the total size of the hard drive
- B . Examine the FAT and identify hidden partitions by noting an H in the partition Type field
- C . Examine the LILO and note an H in the partition Type field
- D . It is not possible to have hidden partitions on a hard drive
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?
- A . evidence must be handled in the same way regardless of the type of case
- B . evidence procedures are not important unless you work for a law enforcement agency
- C . evidence in a criminal case must be secured more tightly than in a civil case
- D . evidence in a civil case must be secured more tightly than in a criminal case
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting .
Why did this ping sweep only produce a few responses?
- A . Only IBM AS/400 will reply to this scan
- B . Only Windows systems will reply to this scan
- C . A switched network will not respond to packets sent to the broadcast address
- D . Only Unix and Unix-like systems will reply to this scan
In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation .
What assistance can the ISP provide?
- A . The ISP can investigate anyone using their service and can provide you with assistance
- B . The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
- C . The ISP can’t conduct any type of investigations on anyone and therefore can’t assist you
- D . ISP’s never maintain log files so they would be of no use to your investigation
Diskcopy is:
- A . a utility by AccessData
- B . a standard MS-DOS command
- C . Digital Intelligence utility
- D . dd copying tool
You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet .
What search string will you use to locate them?
- A . allinurl:"exchange/logon.asp"
- B . intitle:"exchange server"
- C . locate:"logon page"
- D . outlook:"search"
Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city’s network using BGP devices and zombies?
What type of Penetration Testing is Larry planning to carry out?
- A . Router Penetration Testing
- B . DoS Penetration Testing
- C . Firewall Penetration Testing
- D . Internal Penetration Testing
If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?
- A . true
- B . false
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan .
Why would a scanner like Nessus is not recommended in this situation?
- A . Nessus is too loud
- B . Nessus cannot perform wireless testing
- C . Nessus is not a network scanner
- D . There are no ways of performing a "stealthy" wireless scan
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?
- A . 70 years
- B . the life of the author
- C . the life of the author plus 70 years
- D . copyrights last forever