EC-Council 312-49v9 ECCouncil Computer Hacking Forensic Investigator (V9) Online Training
EC-Council 312-49v9 Online Training
The questions for 312-49v9 were last updated at Oct 29,2024.
- Exam Code: 312-49v9
- Exam Name: ECCouncil Computer Hacking Forensic Investigator (V9)
- Certification Provider: EC-Council
- Latest update: Oct 29,2024
What is the target host IP in the following command?
- A . 172.16.28.95
- B . 10.10.150.1
- C . Firewalk does not scan target hosts
- D . This command is using FIN packets, which cannot scan target hosts
What does the acronym POST mean as it relates to a PC?
- A . Primary Operations Short Test
- B . PowerOn Self Test
- C . Pre Operational Situation Test
- D . Primary Operating System Test
You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network .
Why would you want to initiate a DoS attack on a system you are testing?
- A . Show outdated equipment so it can be replaced
- B . List weak points on their network
- C . Use attack as a launching point to penetrate deeper into the network
- D . Demonstrate that no system can be protected against DoS attacks
Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces .
What could have prevented this information from being stolen from the laptops?
- A . EFS Encryption
- B . DFS Encryption
- C . IPS Encryption
- D . SDW Encryption
What TCP/UDP port does the toolkit program netstat use?
- A . Port 7
- B . Port 15
- C . Port 23
- D . Port 69
The MD5 program is used to:
- A . wipe magnetic media before recycling it
- B . make directories on an evidence disk
- C . view graphics files on an evidence drive
- D . verify that a disk is not altered when you examine it
Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT .
Which firewall would be most appropriate for Harold? needs?
- A . Circuit-level proxy firewall
- B . Packet filtering firewall
- C . Application-level proxy firewall
- D . Data link layer firewall
Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages .
What networking protocol language should she learn that routers utilize?
- A . ATM
- B . UDP
- C . BPG
- D . OSPF
Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good.
Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company’s main office in Iowa. She states that she needs the receptionist’s network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for .
What principal of social engineering did Julia use?
- A . Social Validation
- B . Scarcity
- C . Friendship/Liking
- D . Reciprocation
An "idle" system is also referred to as what?
- A . PC not connected to the Internet
- B . Zombie
- C . PC not being used
- D . Bot