Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-49v9 Exam Dumps - ECCouncil CHFIv9 Questions and Answers

Question # 24

Volatile Memory is one of the leading problems for forensics. Worms such as code Red are memory resident and do write themselves to the hard drive, if you turn the system off they disappear. In a lab environment, which of the following options would you suggest as the most appropriate to overcome the problem of capturing volatile memory?

Options:

A.

Use VMware to be able to capture the data in memory and examine it

B.

Give the Operating System a minimal amount of memory, forcing it to use a swap file

C.

Create a Separate partition of several hundred megabytes and place the swap file there

D.

Use intrusion forensic techniques to study memory resident infections

Buy Now
Question # 25

When reviewing web logs, you see an entry for resource not found in the HTTP status code field.

What is the actual error code that you would see in the log for resource not found?

Options:

A.

202

B.

404

C.

606

D.

999

Buy Now
Question # 26

When a user deletes a file or folder, the system stores complete path including the original filename is a special hidden file called “INFO2” in the Recycled folder. If the INFO2 file is deleted, it is recovered when you ______________________.

Options:

A.

Undo the last action performed on the system

B.

Reboot Windows

C.

Use a recovery tool to undelete the file

D.

Download the file from Microsoft website

Buy Now
Question # 27

Which of the following files DOES NOT use Object Linking and Embedding (OLE) technology to embed and link to other objects?

Options:

A.

Portable Document Format

B.

MS-office Word Document

C.

MS-office Word OneNote

D.

MS-office Word PowerPoint

Buy Now
Question # 28

What does the command “C:\>wevtutil gl ” display?

Options:

A.

Configuration information of a specific Event Log

B.

Event logs are saved in .xml format

C.

Event log record structure

D.

List of available Event Logs

Buy Now
Question # 29

When needing to search for a website that is no longer present on the Internet today but was online few years back, what site can be used to view the website collection of pages?

Options:

A.

Proxify.net

B.

Dnsstuff.com

C.

Samspade.org

D.

Archive.org

Buy Now
Question # 30

You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab. How many law-enforcement computer investigators should you request to staff the lab?

Options:

A.

8

B.

1

C.

4

D.

2

Buy Now
Question # 31

Which of the following data structures stores attributes of a process, as well as pointers to other attributes and data structures?

Options:

A.

Lsproc

B.

DumpChk

C.

RegEdit

D.

EProcess

Buy Now
Question # 32

Jacky encrypts her documents using a password. It is known that she uses her daughter’s year of birth as part of the password. Which password cracking technique would be optimal to crack her password?

Options:

A.

Rule-based attack

B.

Brute force attack

C.

Syllable attack

D.

Hybrid attack

Buy Now
Question # 33

Which of the following standard represents a legal precedent sent in 1993 by the Supreme Court of the United States regarding the admissibility of expert witnesses’ testimony during federal legal proceedings?

Options:

A.

IOCE

B.

SWGDE & SWGIT

C.

Frye

D.

Daubert

Buy Now
Exam Code: 312-49v9
Exam Name: Computer Hacking Forensic Investigator (v9)
Last Update: Feb 23, 2025
Questions: 589
312-49v9 pdf

312-49v9 PDF

$25.5  $84.99
312-49v9 Engine

312-49v9 Testing Engine

$28.5  $94.99
312-49v9 PDF + Engine

312-49v9 PDF + Testing Engine

$40.5  $134.99