312-49v10 Exam Dumps

Eccouncil 312-49v10 Dumps - Computer Hacking Forensic Investigator (CHFI-v10) PDF Sample Questions

Eccouncil 312-49v10 This Week Result
They can't be wrong
Score in Real Exam at Testing Centre
Questions came word by word from this dumps
Best Eccouncil 312-49v10 Dumps - pass your exam In First Attempt
Our 312-49v10 dumps are better than all other cheap 312-49v10 study material.
Only best way to pass your Eccouncil 312-49v10 is that if you will get reliable exam study materials. We ensure you that realexamdumps is one of the most authentic website for Eccouncil CHFI v10 exam question answers. Pass your 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) with full confidence. You can get free Computer Hacking Forensic Investigator (CHFI-v10) demo from realexamdumps. We ensure 100% your success in 312-49v10 Exam with the help of Eccouncil Dumps.You will feel proud to become a part of realexamdumps family.
Our success rate from past 5 year very impressive. Our customers are able to build their carrier in IT field.


45000+ Exams

Desire Exam

Exam
Related Exam
Realexamdumps Providing most updated CHFI v10 Question Answers. Here are a few exams:
Eccouncil 312-49v10 Frequently Asked Questions
Sample Questions
Realexamdumps Providing most updated CHFI v10 Question Answers. Here are a few sample questions:
Eccouncil 312-49v10 Sample Question 1
Self-Monitoring, Analysis, and Reporting Technology (SMART) is built into the hard drives to monitor and report system activity. Which of the following is included in the report generated by SMART?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 2
Which of the following ISO standard defines file systems and protocol for exchanging data between optical disks?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 3
A companyâs policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees donât like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 4
What is the capacity of Recycle bin in a system running on Windows Vista?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 5
companyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware.
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 6
Which of the following is NOT a physical evidence?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 7
NTFS sets a flag for the file once you encrypt it and creates an EFS attribute where it stores Data Decryption Field (DDF) and Data Recovery Field (DDR). Which of the following is not a part of DDF?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 8
Which among the following web application threats is resulted when developers expose various internal implementation objects, such as files, directories, database records, or key-through references?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 9
Rusty, a computer forensics apprentice, uses the command nbtstat âc while analyzing the network information in a suspect system. What information is he looking for?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 10
A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 11
Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 12
What is the role of Alloc.c in Apache core?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 13
Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 14
As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 15
As a part of the investigation, Caroline, a forensic expert, was assigned the task to examine the transaction logs pertaining to a database named Transfers. She used SQL Server Management Studio to collect the active transaction log files of the database. Caroline wants to extract detailed information on the logs, including AllocUnitId, page id, slot id, etc. Which of the following commands does she need to execute in order to extract the desired information?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 16
You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a âsimple backup copyâ of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a âsimple backup copyâ will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 17
You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 18
An investigator enters the command sqlcmd -S WIN-CQQMK62867E -e -s"," -E as part of collecting the primary data file and logs from a database. What does the "WIN-CQQMK62867Eâ represent?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 19
BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains a header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 20
Which of the following is a device monitoring tool?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 21
Which of the following does Microsoft Exchange E-mail Server use for collaboration of various e-mail applications?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 22
Ron, a computer forensics expert, is investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in ON condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations can he use to recover the IMEI number?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 23
Smith, an employee of a reputed forensic investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in the hacking of the organizationâs DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry keys will Smith check to find the above information?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 24
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 25
A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt. (Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.) 03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111 TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF ***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32 TCP Options (3) => NOP NOP TS: 23678634 2878772 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= 03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111 UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84 Len: 64 01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................ 00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................ 00 00 00 11 00 00 00 00 ........ =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+= 03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773 UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104 Len: 1084 47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 26
You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 27
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 28
When reviewing web logs, you see an entry for resource not found in the HTTP status code filed. What is the actual error code that you would see in the log for resource not found?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 29
Software firewalls work at which layer of the OSI model?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 30
After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 31
From the following spam mail header, identify the host IP that sent this spam? From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001 Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk (8.11.6/8.11.6) with ESMTP id fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT) Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1) with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT) Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk From: "china hotel web" To: "Shlam" Subject: SHANGHAI (HILTON HOTEL) PACKAGE Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0 X-Priority: 3 X-MSMail- Priority: Normal Reply-To: "china hotel web"
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 32
The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 33
Law enforcement officers are conducting a legal search for which a valid warrant was obtained. While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to describe how this evidence is admissible?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 34
As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 35
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 36
One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 37
Before you are called to testify as an expert, what must an attorney do first?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 38
You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 39
You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 40
Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 41
When investigating a Windows System, it is important to view the contents of the page or swap file because:
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 42
John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 43
George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use in Ethereal?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 44
What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 45
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 46
What happens when a file is deleted by a Microsoft operating system using the FAT file system?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 47
In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 48
Which response organization tracks hoaxes as well as viruses?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 49
If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 50
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 51
What does ICMP Type 3/Code 13 mean?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 52
Which of the following tools will help the investigator to analyze web server logs?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 53
When using an iPod and the host computer is running Windows, what file system will be used?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 54
Which of the following Registry components include offsets to other cells as well as the LastWrite time for the key?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 55
What method of copying should always be performed first before carrying out an investigation?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 56
Madison is on trial for allegedly breaking into her university internal network. The police raided her dorm room and seized all of her computer equipment. Madison lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison lawyer trying to prove the police violated?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 57
What will the following Linux command accomplish? dd if=/dev/mem of=/home/sam/mem.bin bs=1024
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 58
Which tool does the investigator use to extract artifacts left by Google Drive on the system?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 59
Which among the following search warrants allows the first responder to get the victimâs computer information such as service records, billing records, and subscriber information from the service provider?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 60
Which of the following files stores information about local Dropbox installation and account, email IDs linked with the account, current version/build for the local application, the host_id, and local path information?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 61
Which among the following files provides email header information in the Microsoft Exchange server?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 62
Which of the following files gives information about the client sync sessions in Google Drive on Windows?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 63
Which of the following standard represents a legal precedent sent in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnessesâ testimony during federal legal proceedings?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 64
Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 65
After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 66
While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 67
Adam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 68
What type of analysis helps to identify the time and sequence of events in an investigation?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 69
Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 70
Which of the following are small pieces of data sent from a website and stored on the userâs computer by the userâs web browser to track, validate, and maintain specific user information?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 71
When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 72
If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 73
Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 74
When investigating a wireless attack, what information can be obtained from the DHCP logs?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 75
Bob works as information security analyst for a big finance company. One day, the anomaly-based intrusion detection system alerted that a volumetric DDOS targeting the main IP of the main web server was occurring. What kind of attack is it?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 76
Which of the following refers to the process of the witness being questioned by the attorney who called the latter to the stand?
Options:
Answer: C
Eccouncil 312-49v10 Sample Question 77
You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?
Options:
Answer: B
Eccouncil 312-49v10 Sample Question 78
Where are files temporarily written in Unix when printing?
Options:
Answer: E
Eccouncil 312-49v10 Sample Question 79
When should an MD5 hash check be performed when processing evidence?
Options:
Answer: D
Eccouncil 312-49v10 Sample Question 80
What stage of the incident handling process involves reporting events?
Options:
Answer: D