Certbus > EC-COUNCIL > EC-COUNCIL Certifications > 312-49 > 312-49 Online Practice Questions and Answers

312-49 Online Practice Questions and Answers

Questions 4

If a suspect computer is located in an area that may have toxic chemicals, you must:

A. coordinate with the HAZMAT team

B. determine a way to obtain the suspect computer

C. assume the suspect machine is contaminated

D. do not enter alone

Browse 531 Q&As
Questions 5

When obtaining a warrant, it is important to:

A. particularlydescribe the place to be searched and particularly describe the items to be seized

B. generallydescribe the place to be searched and particularly describe the items to be seized

C. generallydescribe the place to be searched and generally describe the items to be seized

D. particularlydescribe the place to be searched and generally describe the items to be seized

Browse 531 Q&As
Questions 6

Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

A. Use VMware to be able to capture the data in memory and examine it

B. Give the Operating System a minimal amount of memory, forcing it to use a swap file

C. Create a Separate partition of several hundred megabytes and place the swap file there

D. Use intrusion forensic techniques to study memory resident infections

Browse 531 Q&As
Questions 7

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

A. The manufacturer of the system compromised

B. The logic, formatting and elegance of the code used in the attack

C. The nature of the attack

D. The vulnerability exploited in the incident

Browse 531 Q&As
Questions 8

You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on the hard disk?

A. Throw the hard disk into the fire

B. Run the powerful magnets over the hard disk

C. Format the hard disk multiple times using a low level disk utility

D. Overwrite the contents of the hard disk with Junk data

Browse 531 Q&As
Questions 9

What is the following command trying to accomplish?

A. Verify that UDP port 445 is open for the 192.168.0.0 network

B. Verify that TCP port 445 is open for the 192.168.0.0 network

C. Verify that NETBIOS is running for the 192.168.0.0 network

D. Verify that UDP port 445 is closed for the 192.168.0.0 network

Browse 531 Q&As
Questions 10

How many possible sequence number combinations are there in TCP/IP protocol?

A. 1 billion

B. 320 billion

C. 4 billion

D. 32 million

Browse 531 Q&As
Questions 11

At what layer does a cross site scripting attack occur on?

A. Presentation

B. Application

C. Session

D. Data Link

Browse 531 Q&As
Questions 12

In the following email header, where did the email first originate from?

A. Somedomain.com

B. Smtp1.somedomain.com

C. Simon1.state.ok.gov.us

D. David1.state.ok.gov.us

Browse 531 Q&As
Questions 13

What does the 63.78.199.4(161) denotes in a Cisco router log?

Mar 14 22:57:53.425 EST: %SEC-6-IPACCESSLOGP: list internet-inbound denied udp 66.56.16.77(1029)

-> 63.78.199.4(161), 1 packet

A. Destination IP address

B. Source IP address

C. Login IP address

D. None of the above

Browse 531 Q&As
Questions 14

Which of the following acts as a network intrusion detection system as well as network intrusion prevention system?

A. Accunetix

B. Nikto

C. Snort

D. Kismet

Browse 531 Q&As
Questions 15

An expert witness is a __________________ who is normally appointed by a party to assist the formulation and preparation of a party's claim or defense.

A. Expert in criminal investigation

B. Subject matter specialist

C. Witness present at the crime scene

D. Expert law graduate appointed by attorney

Browse 531 Q&As
Questions 16

Which of the following Event Correlation Approach is an advanced correlation method that assumes and predicts what an attacker can do next after the attack by studying the statistics and probability and uses only two variables?

A. Bayesian Correlation

B. Vulnerability-Based Approach

C. Rule-Based Approach

D. Route Correlation

Browse 531 Q&As
Questions 17

Which network attack is described by the following statement? "At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."

A. Man-in-the-Middle Attack

B. Sniffer Attack

C. Buffer Overflow

D. DDoS

Browse 531 Q&As
Questions 18

Adam, a forensic analyst, is preparing VMs for analyzing a malware. Which of the following is NOT a best practice?

A. Isolating the host device

B. Installing malware analysis tools

C. Using network simulation tools

D. Enabling shared folders

Browse 531 Q&As
Exam Code: 312-49
Exam Name: ECCouncil Computer Hacking Forensic Investigator (V9)
Last Update: Mar 14, 2025
Questions: 531 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99