Eccouncil 312-49v10 Dumps - Computer Hacking Forensic Investigator (CHFI-v10) PDF Sample Questions

discount banner
Exam Code:
312-49v10
Exam Name:
Computer Hacking Forensic Investigator (CHFI-v10)
704 Questions
Last Update Date : 09 May, 2025
PDF + Test Engine
$65 $84.5
Test Engine Only Demo
$55 $71.5
PDF Only Demo
$45 $58.5

Eccouncil 312-49v10 This Week Result

0

They can't be wrong

0

Score in Real Exam at Testing Centre

0

Questions came word by word from this dumps

Best Eccouncil 312-49v10 Dumps - pass your exam In First Attempt

Our 312-49v10 dumps are better than all other cheap 312-49v10 study material.

Only best way to pass your Eccouncil 312-49v10 is that if you will get reliable exam study materials. We ensure you that realexamdumps is one of the most authentic website for Eccouncil CHFI v10 exam question answers. Pass your 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) with full confidence. You can get free Computer Hacking Forensic Investigator (CHFI-v10) demo from realexamdumps. We ensure 100% your success in 312-49v10 Exam with the help of Eccouncil Dumps.You will feel proud to become a part of realexamdumps family.

Our success rate from past 5 year very impressive. Our customers are able to build their carrier in IT field.

Owl
Search

45000+ Exams

Buy

Desire Exam

Download

Exam

and pass your exam...

Related Exam

Realexamdumps Providing most updated CHFI v10 Question Answers. Here are a few exams:


Eccouncil 312-49v10 Frequently Asked Questions


Sample Questions

Realexamdumps Providing most updated CHFI v10 Question Answers. Here are a few sample questions:

Eccouncil 312-49v10 Sample Question 1

Self-Monitoring, Analysis, and Reporting Technology (SMART) is built into the hard drives to monitor and report system activity. Which of the following is included in the report generated by SMART?


Options:

A. Power Off time
B. Logs of high temperatures the drive has reached
C. All the states (running and discontinued) associated with the OS
D. List of running processes

Answer: C

Eccouncil 312-49v10 Sample Question 2

Which of the following ISO standard defines file systems and protocol for exchanging data between optical disks?


Options:

A. ISO 9660
B. ISO/IEC 13940
C. ISO 9060
D. IEC 3490

Answer: B

Eccouncil 312-49v10 Sample Question 3

A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees don’t like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?


Options:

A. tcp.port = 23
B. tcp.port == 21
C. tcp.port == 21 || tcp.port == 22
D. tcp.port != 21

Answer: C

Eccouncil 312-49v10 Sample Question 4

What is the capacity of Recycle bin in a system running on Windows Vista?


Options:

A. 2.99GB
B. 3.99GB
C. Unlimited
D. 10% of the partition space

Answer: D

Eccouncil 312-49v10 Sample Question 5

companyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware.


Options:

A. Source code review
B. Reviewing the firewalls configuration
C. Data items and vulnerability scanning
D. Interviewing employees and network engineers

Answer: B

Eccouncil 312-49v10 Sample Question 6

Which of the following is NOT a physical evidence?


Options:

A. Removable media
B. Cables
C. Image file on a hard disk
D. Publications

Answer: D

Eccouncil 312-49v10 Sample Question 7

NTFS sets a flag for the file once you encrypt it and creates an EFS attribute where it stores Data Decryption Field (DDF) and Data Recovery Field (DDR). Which of the following is not a part of DDF?


Options:

A. Encrypted FEK
B. Checksum
C. EFS Certificate Hash
D. Container Name

Answer: C

Eccouncil 312-49v10 Sample Question 8

Which among the following web application threats is resulted when developers expose various internal implementation objects, such as files, directories, database records, or key-through references?


Options:

A. Remote File Inclusion
B. Cross Site Scripting
C. Insecure Direct Object References
D. Cross Site Request Forgery

Answer: D

Eccouncil 312-49v10 Sample Question 9

Rusty, a computer forensics apprentice, uses the command nbtstat –c while analyzing the network information in a suspect system. What information is he looking for?


Options:

A. Contents of the network routing table
B. Status of the network carrier
C. Contents of the NetBIOS name cache
D. Network connections

Answer: D

Eccouncil 312-49v10 Sample Question 10

A Linux system is undergoing investigation. In which directory should the investigators look for its current state data if the system is in powered on state?


Options:

A. /auth
B. /proc
C. /var/log/debug
D. /var/spool/cron/

Answer: C

Eccouncil 312-49v10 Sample Question 11

Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?


Options:

A. The firewall rejected a connection
B. A virus was detected in an email
C. The firewall dropped a connection
D. An email was marked as potential spam

Answer: D

Eccouncil 312-49v10 Sample Question 12

What is the role of Alloc.c in Apache core?


Options:

A. It handles allocation of resource pools
B. It is useful for reading and handling of the configuration files
C. It takes care of all the data exchange and socket connections between the client and the server
D. It handles server start-ups and timeouts

Answer: B

Eccouncil 312-49v10 Sample Question 13

Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.


Options:

A. DevScan
B. Devcon
C. fsutil
D. Reg.exe

Answer: C

Eccouncil 312-49v10 Sample Question 14

As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?


Options:

A. Status of users connected to the internet
B. Net status of computer usage
C. Information about network connections
D. Status of network hardware

Answer: D

Eccouncil 312-49v10 Sample Question 15

As a part of the investigation, Caroline, a forensic expert, was assigned the task to examine the transaction logs pertaining to a database named Transfers. She used SQL Server Management Studio to collect the active transaction log files of the database. Caroline wants to extract detailed information on the logs, including AllocUnitId, page id, slot id, etc. Which of the following commands does she need to execute in order to extract the desired information?


Options:

A. DBCC LOG(Transfers, 1)
B. DBCC LOG(Transfers, 3)
C. DBCC LOG(Transfers, 0)
D. DBCC LOG(Transfers, 2)

Answer: E

Eccouncil 312-49v10 Sample Question 16

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a “simple backup copy” of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a “simple backup copy” will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?


Options:

A. Robust copy
B. Incremental backup copy
C. Bit-stream copy
D. Full backup copy

Answer: D

Eccouncil 312-49v10 Sample Question 17

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?


Options:

A. All three servers need to be placed internally
B. A web server and the database server facing the Internet, an application server on the internal network
C. A web server facing the Internet, an application server on the internal network, a database server on the internal network
D. All three servers need to face the Internet so that they can communicate between themselves

Answer: E

Eccouncil 312-49v10 Sample Question 18

An investigator enters the command sqlcmd -S WIN-CQQMK62867E -e -s"," -E as part of collecting the primary data file and logs from a database. What does the "WIN-CQQMK62867E” represent?


Options:

A. Name of the Database
B. Name of SQL Server
C. Operating system of the system
D. Network credentials of the database

Answer: C

Eccouncil 312-49v10 Sample Question 19

BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains a header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?


Options:

A. Information header
B. Image data
C. The RGBQUAD array
D. Header

Answer: B

Eccouncil 312-49v10 Sample Question 20

Which of the following is a device monitoring tool?


Options:

A. Capsa
B. Driver Detective
C. Regshot
D. RAM Capturer

Answer: B

Eccouncil 312-49v10 Sample Question 21

Which of the following does Microsoft Exchange E-mail Server use for collaboration of various e-mail applications?


Options:

A. Simple Mail Transfer Protocol (SMTP)
B. Messaging Application Programming Interface (MAPI)
C. Internet Message Access Protocol (IMAP)
D. Post Office Protocol version 3 (POP3)

Answer: C

Eccouncil 312-49v10 Sample Question 22

Ron, a computer forensics expert, is investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in ON condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations can he use to recover the IMEI number?


Options:

A. #*06*#
B. *#06#
C. #06#*
D. *IMEI#

Answer: B

Eccouncil 312-49v10 Sample Question 23

Smith, an employee of a reputed forensic investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in the hacking of the organization’s DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry keys will Smith check to find the above information?


Options:

A. TypedURLs key
B. MountedDevices key
C. UserAssist Key
D. RunMRU key

Answer: E

Eccouncil 312-49v10 Sample Question 24

What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?


Options:

A. ICMP header field
B. TCP header field
C. IP header field
D. UDP header field

Answer: C

Eccouncil 312-49v10 Sample Question 25

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111

TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF

***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32

TCP Options (3) => NOP NOP TS: 23678634 2878772

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111

UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84

Len: 64

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................

00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................

00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................

00 00 00 11 00 00 00 00 ........

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773

UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104

Len: 1084

47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8


Options:

A. The attacker has conducted a network sweep on port 111
B. The attacker has scanned and exploited the system using Buffer Overflow
C. The attacker has used a Trojan on port 32773
D. The attacker has installed a backdoor

Answer: B

Eccouncil 312-49v10 Sample Question 26

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?


Options:

A. Show outdated equipment so it can be replaced
B. List weak points on their network
C. Use attack as a launching point to penetrate deeper into the network
D. Demonstrate that no system can be protected against DoS attacks

Answer: C

Eccouncil 312-49v10 Sample Question 27

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?


Options:

A. 70 years
B. the life of the author
C. the life of the author plus 70 years
D. copyrights last forever

Answer: D

Eccouncil 312-49v10 Sample Question 28

When reviewing web logs, you see an entry for resource not found in the HTTP status code filed.

What is the actual error code that you would see in the log for resource not found?


Options:

A. 202
B. 404
C. 505
D. 909

Answer: C

Eccouncil 312-49v10 Sample Question 29

Software firewalls work at which layer of the OSI model?


Options:

A. Application
B. Network
C. Transport
D. Data Link

Answer: E

Eccouncil 312-49v10 Sample Question 30

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?


Options:

A. Stateful firewalls do not work with packet filtering firewalls
B. NAT does not work with stateful firewalls
C. IPSEC does not work with packet filtering firewalls
D. NAT does not work with IPSEC

Answer: E

Eccouncil 312-49v10 Sample Question 31

From the following spam mail header, identify the host IP that sent this spam?

From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001

Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk

(8.11.6/8.11.6) with ESMTP id

fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)

Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by

viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1)

with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)

Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk

From: "china hotel web"

To: "Shlam"

Subject: SHANGHAI (HILTON HOTEL) PACKAGE

Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0

X-Priority: 3 X-MSMail-

Priority: Normal

Reply-To: "china hotel web"


Options:

A. 137.189.96.52
B. 8.12.1.0
C. 203.218.39.20
D. 203.218.39.50

Answer: D

Eccouncil 312-49v10 Sample Question 32

The efforts to obtain information before a trail by demanding documents, depositions, questioned and answers written under oath, written requests for admissions of fact and examination of the scene is a description of what legal term?


Options:

A. Detection
B. Hearsay
C. Spoliation
D. Discovery

Answer: E

Eccouncil 312-49v10 Sample Question 33

Law enforcement officers are conducting a legal search for which a valid warrant was obtained.

While conducting the search, officers observe an item of evidence for an unrelated crime that was not included in the warrant. The item was clearly visible to the officers and immediately identified as evidence. What is the term used to describe how this evidence is admissible?


Options:

A. Plain view doctrine
B. Corpus delicti
C. Locard Exchange Principle
D. Ex Parte Order

Answer: B

Eccouncil 312-49v10 Sample Question 34

As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?


Options:

A. The IP address of the employees’ computers
B. Bank account numbers and the corresponding routing numbers
C. The employees network usernames and passwords
D. The MAC address of the employees’ computers

Answer: D

Eccouncil 312-49v10 Sample Question 35

On Linux/Unix based Web servers, what privilege should the daemon service be run under?


Options:

A. Guest
B. Root
C. You cannot determine what privilege runs the daemon service
D. Something other than root

Answer: E

Eccouncil 312-49v10 Sample Question 36

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?


Options:

A. the File Allocation Table
B. the file header
C. the file footer
D. the sector map

Answer: C

Eccouncil 312-49v10 Sample Question 37

Before you are called to testify as an expert, what must an attorney do first?


Options:

A. engage in damage control
B. prove that the tools you used to conduct your examination are perfect
C. read your curriculum vitae to the jury
D. qualify you as an expert witness

Answer: E

Eccouncil 312-49v10 Sample Question 38

You are running through a series of tests on your network to check for any security vulnerabilities.

After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?


Options:

A. The firewall failed-bypass
B. The firewall failed-closed
C. The firewall ACL has been purged
D. The firewall failed-open

Answer: E

Eccouncil 312-49v10 Sample Question 39

You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?


Options:

A. Poison the DNS records with false records
B. Enumerate MX and A records from DNS
C. Establish a remote connection to the Domain Controller
D. Enumerate domain user accounts and built-in groups

Answer: E

Eccouncil 312-49v10 Sample Question 40

Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime?


Options:

A. bench warrant
B. wire tap
C. subpoena
D. search warrant

Answer: E

Eccouncil 312-49v10 Sample Question 41

When investigating a Windows System, it is important to view the contents of the page or swap file because:


Options:

A. Windows stores all of the systems configuration information in this file
B. This is file that windows use to communicate directly with Registry
C. A Large volume of data can exist within the swap file of which the computer user has no knowledge
D. This is the file that windows use to store the history of the last 100 commands that were run from the command line

Answer: D

Eccouncil 312-49v10 Sample Question 42

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?


Options:

A. Firewalk cannot pass through Cisco firewalls
B. Firewalk sets all packets with a TTL of zero
C. Firewalk cannot be detected by network sniffers
D. Firewalk sets all packets with a TTL of one

Answer: E

Eccouncil 312-49v10 Sample Question 43

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.

What filter should George use in Ethereal?


Options:

A. src port 23 and dst port 23
B. udp port 22 and host 172.16.28.1/24
C. net port 22
D. src port 22 and dst port 22

Answer: E

Eccouncil 312-49v10 Sample Question 44

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the router are effectively disabled?


Options:

A. digital attack
B. denial of service
C. physical attack
D. ARP redirect

Answer: C

Eccouncil 312-49v10 Sample Question 45

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?


Options:

A. rootkit
B. key escrow
C. steganography
D. Offset

Answer: D

Eccouncil 312-49v10 Sample Question 46

What happens when a file is deleted by a Microsoft operating system using the FAT file system?


Options:

A. only the reference to the file is removed from the FAT
B. the file is erased and cannot be recovered
C. a copy of the file is stored and the original file is erased
D. the file is erased but can be recovered

Answer: B

Eccouncil 312-49v10 Sample Question 47

In a forensic examination of hard drives for digital evidence, what type of user is most likely to have the most file slack to analyze?


Options:

A. one who has NTFS 4 or 5 partitions
B. one who uses dynamic swap file capability
C. one who uses hard disk writes on IRQ 13 and 21
D. one who has lots of allocation units per block or cluster

Answer: E

Eccouncil 312-49v10 Sample Question 48

Which response organization tracks hoaxes as well as viruses?


Options:

A. NIPC
B. FEDCIRC
C. CERT
D. CIAC

Answer: E

Eccouncil 312-49v10 Sample Question 49

If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?


Options:

A. true
B. false

Answer: B

Eccouncil 312-49v10 Sample Question 50

After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?


Options:

A. Only IBM AS/400 will reply to this scan
B. Only Windows systems will reply to this scan
C. A switched network will not respond to packets sent to the broadcast address
D. Only Unix and Unix-like systems will reply to this scan

Answer: E

Eccouncil 312-49v10 Sample Question 51

What does ICMP Type 3/Code 13 mean?


Options:

A. Host Unreachable
B. Administratively Blocked
C. Port Unreachable
D. Protocol Unreachable

Answer: C

Eccouncil 312-49v10 Sample Question 52

Which of the following tools will help the investigator to analyze web server logs?


Options:

A. XRY LOGICAL
B. LanWhois
C. Deep Log Monitor
D. Deep Log Analyzer

Answer: E

Eccouncil 312-49v10 Sample Question 53

When using an iPod and the host computer is running Windows, what file system will be used?


Options:

A. iPod+
B. HFS
C. FAT16
D. FAT32

Answer: E

Eccouncil 312-49v10 Sample Question 54

Which of the following Registry components include offsets to other cells as well as the LastWrite time for the key?


Options:

A. Value list cell
B. Value cell
C. Key cell
D. Security descriptor cell

Answer: D

Eccouncil 312-49v10 Sample Question 55

What method of copying should always be performed first before carrying out an investigation?


Options:

A. Parity-bit copy
B. Bit-stream copy
C. MS-DOS disc copy
D. System level copy

Answer: C

Eccouncil 312-49v10 Sample Question 56

Madison is on trial for allegedly breaking into her university internal network. The police raided her dorm room and seized all of her computer equipment. Madison lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison lawyer trying to prove the police violated?


Options:

A. The 10th Amendment
B. The 5th Amendment
C. The 1st Amendment
D. The 4th Amendment

Answer: E

Eccouncil 312-49v10 Sample Question 57

What will the following Linux command accomplish?

dd if=/dev/mem of=/home/sam/mem.bin bs=1024


Options:

A. Copy the master boot record to a file
B. Copy the contents of the system folder to a file
C. Copy the running memory to a file
D. Copy the memory dump file to an image file

Answer: D

Eccouncil 312-49v10 Sample Question 58

Which tool does the investigator use to extract artifacts left by Google Drive on the system?


Options:

A. PEBrowse Professional
B. RegScanner
C. RAM Capturer
D. Dependency Walker

Answer: D

Eccouncil 312-49v10 Sample Question 59

Which among the following search warrants allows the first responder to get the victim’s computer information such as service records, billing records, and subscriber information from the service provider?


Options:

A. Citizen Informant Search Warrant
B. Electronic Storage Device Search Warrant
C. John Doe Search Warrant
D. Service Provider Search Warrant

Answer: C

Eccouncil 312-49v10 Sample Question 60

Which of the following files stores information about local Dropbox installation and account, email IDs linked with the account, current version/build for the local application, the host_id, and local path information?


Options:

A. host.db
B. sigstore.db
C. config.db
D. filecache.db

Answer: D

Eccouncil 312-49v10 Sample Question 61

Which among the following files provides email header information in the Microsoft Exchange server?


Options:

A. gwcheck.db
B. PRIV.EDB
C. PUB.EDB
D. PRIV.STM

Answer: C

Eccouncil 312-49v10 Sample Question 62

Which of the following files gives information about the client sync sessions in Google Drive on Windows?


Options:

A. sync_log.log
B. Sync_log.log
C. sync.log
D. Sync.log

Answer: C

Eccouncil 312-49v10 Sample Question 63

Which of the following standard represents a legal precedent sent in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses’ testimony during federal legal proceedings?


Options:

A. IOCE
B. SWGDE & SWGIT
C. Frye
D. Daubert

Answer: E

Eccouncil 312-49v10 Sample Question 64

Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?


Options:

A. Microsoft Outlook
B. Eudora
C. Mozilla Thunderbird
D. Microsoft Outlook Express

Answer: E

Eccouncil 312-49v10 Sample Question 65

After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?


Options:

A. RestrictAnonymous must be set to "10" for complete security
B. RestrictAnonymous must be set to "3" for complete security
C. RestrictAnonymous must be set to "2" for complete security
D. There is no way to always prevent an anonymous null session from establishing

Answer: D

Eccouncil 312-49v10 Sample Question 66

While presenting his case to the court, Simon calls many witnesses to the stand to testify. Simon decides to call Hillary Taft, a lay witness, to the stand. Since Hillary is a lay witness, what field would she be considered an expert in?


Options:

A. Technical material related to forensics
B. No particular field
C. Judging the character of defendants/victims
D. Legal issues

Answer: C

Eccouncil 312-49v10 Sample Question 67

Adam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?


Options:

A. PRIV.STM
B. gwcheck.db
C. PRIV.EDB
D. PUB.EDB

Answer: B

Eccouncil 312-49v10 Sample Question 68

What type of analysis helps to identify the time and sequence of events in an investigation?


Options:

A. Time-based
B. Functional
C. Relational
D. Temporal

Answer: E

Eccouncil 312-49v10 Sample Question 69

Casey has acquired data from a hard disk in an open source acquisition format that allows her to generate compressed or uncompressed image files. What format did she use?


Options:

A. Portable Document Format
B. Advanced Forensics Format (AFF)
C. Proprietary Format
D. Raw Format

Answer: C

Eccouncil 312-49v10 Sample Question 70

Which of the following are small pieces of data sent from a website and stored on the user’s computer by the user’s web browser to track, validate, and maintain specific user information?


Options:

A. Temporary Files
B. Open files
C. Cookies
D. Web Browser Cache

Answer: D

Eccouncil 312-49v10 Sample Question 71

When carrying out a forensics investigation, why should you never delete a partition on a dynamic disk?


Options:

A. All virtual memory will be deleted
B. The wrong partition may be set to active
C. This action can corrupt the disk
D. The computer will be set in a constant reboot state

Answer: D

Eccouncil 312-49v10 Sample Question 72

If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?


Options:

A. Keep the device powered on
B. Turn off the device immediately
C. Remove the battery immediately
D. Remove any memory cards immediately

Answer: B

Eccouncil 312-49v10 Sample Question 73

Under confession, an accused criminal admitted to encrypting child pornography pictures and then hiding them within other pictures. What technique did the accused criminal employ?


Options:

A. Typography
B. Steganalysis
C. Picture encoding
D. Steganography

Answer: E

Eccouncil 312-49v10 Sample Question 74

When investigating a wireless attack, what information can be obtained from the DHCP logs?


Options:

A. The operating system of the attacker and victim computers
B. IP traffic between the attacker and the victim
C. MAC address of the attacker
D. If any computers on the network are running in promiscuous mode

Answer: D

Eccouncil 312-49v10 Sample Question 75

Bob works as information security analyst for a big finance company. One day, the anomaly-based intrusion detection system alerted that a volumetric DDOS targeting the main IP of the main web server was occurring. What kind of attack is it?


Options:

A. IDS attack
B. APT
C. Web application attack
D. Network attack

Answer: E

Eccouncil 312-49v10 Sample Question 76

Which of the following refers to the process of the witness being questioned by the attorney who called the latter to the stand?


Options:

A. Witness Authentication
B. Direct Examination
C. Expert Witness
D. Cross Questioning

Answer: C

Eccouncil 312-49v10 Sample Question 77

You have been called in to help with an investigation of an alleged network intrusion. After questioning the members of the company IT department, you search through the server log files to find any trace of the intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be found. While connected to the router, you see some unusual activity and believe that the attackers are currently connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from the router?


Options:

A. Network
B. Transport
C. Data Link
D. Session

Answer: B

Eccouncil 312-49v10 Sample Question 78

Where are files temporarily written in Unix when printing?


Options:

A. /usr/spool
B. /var/print
C. /spool
D. /var/spool

Answer: E

Eccouncil 312-49v10 Sample Question 79

When should an MD5 hash check be performed when processing evidence?


Options:

A. After the evidence examination has been completed
B. On an hourly basis during the evidence examination
C. Before and after evidence examination
D. Before the evidence examination has been completed

Answer: D

Eccouncil 312-49v10 Sample Question 80

What stage of the incident handling process involves reporting events?


Options:

A. Containment
B. Follow-up
C. Identification
D. Recovery

Answer: D