Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-49v10 Exam Dumps - ECCouncil CHFI v10 Questions and Answers

Question # 84

What is the default IIS log location?

Options:

A.

SystemDrive\inetpub\LogFiles

B.

%SystemDrive%\inetpub\logs\LogFiles

C.

%SystemDrive\logs\LogFiles

D.

SystemDrive\logs\LogFiles

Buy Now
Question # 85

A computer forensics investigator is inspecting the firewall logs for a large financial institution that has employees working 24 hours a day, 7 days a week.

What can the investigator infer from the screenshot seen below?

Options:

A.

A smurf attack has been attempted

B.

A denial of service has been attempted

C.

Network intrusion has occurred

D.

Buffer overflow attempt on the firewall.

Buy Now
Question # 86

Which among the following files provides email header information in the Microsoft Exchange server?

Options:

A.

gwcheck.db

B.

PRIV.EDB

C.

PUB.EDB

D.

PRIV.STM

Buy Now
Question # 87

While looking through the IIS log file of a web server, you find the following entries:

What is evident from this log file?

Options:

A.

Web bugs

B.

Cross site scripting

C.

Hidden fields

D.

SQL injection is possible

Buy Now
Question # 88

Which of the following are small pieces of data sent from a website and stored on the user’s computer by the user’s web browser to track, validate, and maintain specific user information?

Options:

A.

Temporary Files

B.

Open files

C.

Cookies

D.

Web Browser Cache

Buy Now
Question # 89

When reviewing web logs, you see an entry for resource not found in the HTTP status code filed.

What is the actual error code that you would see in the log for resource not found?

Options:

A.

202

B.

404

C.

505

D.

909

Buy Now
Question # 90

Richard is extracting volatile data from a system and uses the command doskey/history. What is he trying to extract?

Options:

A.

Events history

B.

Previously typed commands

C.

History of the browser

D.

Passwords used across the system

Buy Now
Question # 91

Which password cracking technique uses every possible combination of character sets?

Options:

A.

Rainbow table attack

B.

Brute force attack

C.

Rule-based attack

D.

Dictionary attack

Buy Now
Question # 92

Which program is the bootloader when Windows XP starts up?

Options:

A.

KERNEL.EXE

B.

NTLDR

C.

LOADER

D.

LILO

Buy Now
Question # 93

Before performing a logical or physical search of a drive in Encase, what must be added to the program?

Options:

A.

File signatures

B.

Keywords

C.

Hash sets

D.

Bookmarks

Buy Now
Exam Code: 312-49v10
Exam Name: Computer Hacking Forensic Investigator (CHFI-v10)
Last Update: Jan 31, 2025
Questions: 704
312-49v10 pdf

312-49v10 PDF

$25.5  $84.99
312-49v10 Engine

312-49v10 Testing Engine

$28.5  $94.99
312-49v10 PDF + Engine

312-49v10 PDF + Testing Engine

$40.5  $134.99