EC-Council 312-49v9 ECCouncil Computer Hacking Forensic Investigator (V9) Online Training
EC-Council 312-49v9 Online Training
The questions for 312-49v9 were last updated at Oct 29,2024.
- Exam Code: 312-49v9
- Exam Name: ECCouncil Computer Hacking Forensic Investigator (V9)
- Certification Provider: EC-Council
- Latest update: Oct 29,2024
Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer.
Where should Harold navigate on the computer to find the file?
- A . %systemroot%system32LSA
- B . %systemroot%system32driversetc
- C . %systemroot%repair
- D . %systemroot%LSA
Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence.
The organization had used a Virtual Environment to trap Bob .
What is a Virtual Environment?
- A . A Honeypot that traps hackers
- B . A system Using Trojaned commands
- C . An environment set up after the user logs in
- D . An environment set up before a user logs in
In the context of file deletion process, which of the following statement holds true?
- A . When files are deleted, the data is overwritten and the cluster marked as available
- B . The longer a disk is in use, the less likely it is that deleted files will be overwritten
- C . While booting, the machine may create temporary files that can delete evidence
- D . Secure delete programs work by completely overwriting the file in one go
You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company.
You type in the following URL that includes the IP address of one of the routers:
http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router .
What have you discovered?
- A . HTTP Configuration Arbitrary Administrative Access Vulnerability
- B . HTML Configuration Arbitrary Administrative Access Vulnerability
- C . Cisco IOS Arbitrary Administrative Access Online Vulnerability
- D . URL Obfuscation Arbitrary Administrative Access Vulnerability
Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security.
Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort .
Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?
- A . Border Gateway Protocol
- B . Cisco Discovery Protocol
- C . Broadcast System Protocol
- D . Simple Network Management Protocol
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
- A . ICMP header field
- B . TCP header field
- C . IP header field
- D . UDP header field
What operating system would respond to the following command?
- A . Windows 95
- B . FreeBSD
- C . Windows XP
- D . Mac OS X
From the following spam mail header, identify the host IP that sent this spam?
From [email protected] [email protected] Tue Nov 27 17:27:11 2001
Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk
(8.11.6/8.11.6) with ESMTP id
fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)
Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by
viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1)
with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)
Message-Id: >[email protected]
From: "china hotel web"
To: "Shlam"
Subject: SHANGHAI (HILTON HOTEL) PACKAGE
Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0
X-Priority: 3 X-MSMail-
Priority: Normal
Reply-To: "china hotel web"
- A . 137.189.96.52
- B . 8.12.1.0
- C . 203.218.39.20
- D . 203.218.39.50
In a FAT32 system, a 123 KB file will use how many sectors?
- A . 34
- B . 25
- C . 11
- D . 56
If a suspect computer is located in an area that may have toxic chemicals, you must:
- A . coordinate with the HAZMAT team
- B . determine a way to obtain the suspect computer
- C . assume the suspect machine is contaminated
- D . do not enter alone