EC-Council 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) Online Training
EC-Council 312-49v10 Online Training
The questions for 312-49v10 were last updated at Sep 07,2025.
- Exam Code: 312-49v10
- Exam Name: Computer Hacking Forensic Investigator (CHFI-v10)
- Certification Provider: EC-Council
- Latest update: Sep 07,2025
During the course of a corporate investigation, you find that an Employee is committing a crime.
Can the Employer file a criminal complaint with Police?
- A . Yes, and all evidence can be turned over to the police
- B . Yes, but only if you turn the evidence over to a federal law enforcement agency
- C . No, because the investigation was conducted without following standard police procedures
- D . No, because the investigation was conducted without warrant
During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact finding process. Therefore, you report this evidence.
This type of evidence is known as:
- A . Inculpatory evidence
- B . Mandatory evidence
- C . Exculpatory evidence
- D . Terrible evidence
A packet is sent to a router that does not have the packet destination address in its route table.
How will the packet get to its proper destination?
- A . Root Internet servers
- B . Border Gateway Protocol
- C . Gateway of last resort
- D . Reverse DNS
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?
- A . 70 years
- B . the life of the author
- C . the life of the author plus 70 years
- D . copyrights last forever
You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network.
Why would you want to initiate a DoS attack on a system you are testing?
- A . Show outdated equipment so it can be replaced
- B . List weak points on their network
- C . Use attack as a launching point to penetrate deeper into the network
- D . Demonstrate that no system can be protected against DoS attacks
To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software.
What group is actively providing tools and creating procedures for testing and validating computer forensics software?
- A . Computer Forensics Tools and Validation Committee (CFTVC)
- B . Association of Computer Forensics Software Manufactures (ACFSM)
- C . National Institute of Standards and Technology (NIST)
- D . Society for Valid Forensics Tools and Testing (SVFTT)
You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab.
What can you do to prove that the evidence is the same as it was when it first entered the lab?
- A . make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab
- B . make an MD5 hash of the evidence and compare it to the standard database developed by NIST
- C . there is no reason to worry about this possible claim because state labs are certified
- D . sign a statement attesting that the evidence is the same as it was when it entered the
lab
The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing, copying and misappropriating proprietary computer software belonging to the several victim companies.
What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?
- A . The Fourth Amendment
- B . The USA patriot Act
- C . The Good Samaritan Laws
- D . The Federal Rules of Evidence
You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company’s network.
How would you answer?
- A . Microsoft Methodology
- B . Google Methodology
- C . IBM Methodology
- D . LPT Methodology
Kyle is performing the final testing of an application he developed for the accounting department.
His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command.
What is he testing at this point?
#include #include int main(int argc, char
*argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s stringn", argv[0]); return 1; }
strcpy(buffer, argv[1]); return 0; }
- A . Buffer overflow
- B . SQL injection
- C . Format string bug
- D . Kernal injection