EC-Council 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) Online Training
EC-Council 312-49v10 Online Training
The questions for 312-49v10 were last updated at Sep 06,2025.
- Exam Code: 312-49v10
- Exam Name: Computer Hacking Forensic Investigator (CHFI-v10)
- Certification Provider: EC-Council
- Latest update: Sep 06,2025
In Linux, what is the smallest possible shellcode?
- A . 24 bytes
- B . 8 bytes
- C . 800 bytes
- D . 80 bytes
James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network.
What type of DoS attack is James testing against his network?
- A . Smurf
- B . Trinoo
- C . Fraggle
- D . SYN flood
What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?
- A . rootkit
- B . key escrow
- C . steganography
- D . Offset
What does ICMP Type 3/Code 13 mean?
- A . Host Unreachable
- B . Administratively Blocked
- C . Port Unreachable
- D . Protocol Unreachable
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
- A . Linux/Unix computers are easier to compromise
- B . Linux/Unix computers are constantly talking
- C . Windows computers are constantly talking
- D . Windows computers will not respond to idle scans
What TCP/UDP port does the toolkit program netstat use?
- A . Port 7
- B . Port 15
- C . Port 23
- D . Port 69
You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company.
What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different.
What area of the law is the employee violating?
- A . trademark law
- B . copyright law
- C . printright law
- D . brandmark law
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related.
What organization should Frank submit the log to find out if it is a new vulnerability or not?
- A . APIPA
- B . IANA
- C . CVE
- D . RIPE
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives.
One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:
- A . HKEY_LOCAL_MACHINEhardwarewindowsstart
- B . HKEY_LOCAL_USERSSoftwareMicrosoftoldVersionLoad
- C . HKEY_CURRENT_USERMicrosoftDefault
- D . HKEY_LOCAL_MACHINESoftwareMicrosoftCurrentVersionRun
You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved.
What should you examine next in this case?
- A . The registry
- B . The swap file
- C . The recycle bin
- D . The metadata