EC-Council 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) Online Training
EC-Council 312-49v10 Online Training
The questions for 312-49v10 were last updated at Sep 06,2025.
- Exam Code: 312-49v10
- Exam Name: Computer Hacking Forensic Investigator (CHFI-v10)
- Certification Provider: EC-Council
- Latest update: Sep 06,2025
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan.
Why would a scanner like Nessus is not recommended in this situation?
- A . Nessus is too loud
- B . Nessus cannot perform wireless testing
- C . Nessus is not a network scanner
- D . There are no ways of performing a "stealthy" wireless scan
You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source.
Which of the following are you most interested in when trying to trace the source of the message?
- A . The X509 Address
- B . The SMTP reply Address
- C . The E-mail Header
- D . The Host Domain Name
What does mactime, an essential part of the coroner’s toolkit do?
- A . It traverses the file system and produces a listing of all files based on the modification, access and change timestamps
- B . It can recover deleted file space and search it for data. However, it does not allow the investigator to preview them
- C . The tools scans for i-node information, which is used by other tools in the tool kit
- D . It is too specific to the MAC OS and forms a core component of the toolkit
Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good.
Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company’s main office in Iowa. She states that she needs the receptionist’s network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for.
What principal of social engineering did Julia use?
- A . Social Validation
- B . Scarcity
- C . Friendship/Liking
- D . Reciprocation
The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.
- A . Gramm-Leach-Bliley Act
- B . Sarbanes-Oxley 2002
- C . California SB 1386
- D . HIPAA
To preserve digital evidence, an investigator should ____________________.
- A . Make two copies of each evidence item using a single imaging tool
- B . Make a single copy of each evidence item using an approved imaging tool
- C . Make two copies of each evidence item using different imaging tools
- D . Only store the original evidence item
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?
- A . Passive IDS
- B . Active IDS
- C . Progressive IDS
- D . NIPS
As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company.
What information will you be able to gather?
- A . The IP address of the employees’ computers
- B . Bank account numbers and the corresponding routing numbers
- C . The employees network usernames and passwords
- D . The MAC address of the employees’ computers
You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation.
Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive.
How will these forms be stored to help preserve the chain of custody of the case?
- A . All forms should be placed in an approved secure container because they are now primary evidence in the case.
- B . The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.
- C . The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.
- D . All forms should be placed in the report file because they are now primary evidence in the case.
Sectors in hard disks typically contain how many bytes?
- A . 256
- B . 512
- C . 1024
- D . 2048