EC-Council 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) Online Training
EC-Council 312-49v10 Online Training
The questions for 312-49v10 were last updated at Jul 12,2025.
- Exam Code: 312-49v10
- Exam Name: Computer Hacking Forensic Investigator (CHFI-v10)
- Certification Provider: EC-Council
- Latest update: Jul 12,2025
In a FAT32 system, a 123 KB file will use how many sectors?
- A . 34
- B . 25
- C . 11
- D . 56
When investigating a Windows System, it is important to view the contents of the page or swap file because:
- A . Windows stores all of the systems configuration information in this file
- B . This is file that windows use to communicate directly with Registry
- C . A Large volume of data can exist within the swap file of which the computer user has no knowledge
- D . This is the file that windows use to store the history of the last 100 commands that were run from the command line
When obtaining a warrant, it is important to:
- A . particularlydescribe the place to be searched and particularly describe the items to be seized
- B . generallydescribe the place to be searched and particularly describe the items to be seized
- C . generallydescribe the place to be searched and generally describe the items to be seized
- D . particularlydescribe the place to be searched and generally describe the items to be seized
When examining the log files from a Windows IIS Web Server, how often is a new log file created?
- A . the same log is used at all times
- B . a new log file is created everyday
- C . a new log file is created each week
- D . a new log is created each time the Web Server is started
Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces.
What could have prevented this information from being stolen from the laptops?
- A . EFS Encryption
- B . DFS Encryption
- C . IPS Encryption
- D . SDW Encryption
Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri’s duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company’s switches with ACK bit and the source address of her machine set.
What is Terri trying to accomplish by sending this IP packet?
- A . Trick the switch into thinking it already has a session with Terri’s computer
- B . Poison the switch’s MAC address table by flooding it with ACK bits
- C . Crash the switch with a DoS attack since switches cannot send ACK bits
- D . Enable tunneling feature on the switch
What binary coding is used most often for e-mail purposes?
- A . MIME
- B . Uuencode
- C . IMAP
- D . SMTP
After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet.
Why is that?
- A . Stateful firewalls do not work with packet filtering firewalls
- B . NAT does not work with stateful firewalls
- C . IPSEC does not work with packet filtering firewalls
- D . NAT does not work with IPSEC
Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?
- A . 18 U.S.C. 1029
- B . 18 U.S.C. 1362
- C . 18 U.S.C. 2511
- D . 18 U.S.C. 2703
Diskcopy is:
- A . a utility by AccessData
- B . a standard MS-DOS command
- C . Digital Intelligence utility
- D . dd copying tool