Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

312-49v9 Exam Dumps - ECCouncil CHFIv9 Questions and Answers

Question # 54

Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?

Options:

A.

Dictionary attack

B.

Brute force attack

C.

Rule-based attack

D.

Man in the middle attack

Buy Now
Question # 55

What stage of the incident handling process involves reporting events?

Options:

A.

Containment

B.

Follow-up

C.

Identification

D.

Recovery

Buy Now
Question # 56

Jason is the security administrator of ACMA metal Corporation. One day he notices the company's Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately.

Which organization coordinates computer crimes investigations throughout the United States?

Options:

A.

Internet Fraud Complaint Center

B.

Local or national office of the U.S. Secret Service

C.

National Infrastructure Protection Center

D.

CERT Coordination Center

Buy Now
Question # 57

In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?

Options:

A.

Chosen-message attack

B.

Known-cover attack

C.

Known-message attack

D.

Known-stego attack

Buy Now
Question # 58

During the trial, an investigator observes that one of the principal witnesses is severely ill and cannot be present for the hearing. He decides to record the evidence and present it to the court. Under which rule should he present such evidence?

Options:

A.

Rule 1003: Admissibility of Duplicates

B.

Limited admissibility

C.

Locard’s Principle

D.

Hearsay

Buy Now
Question # 59

In the following directory listing,

Which file should be used to restore archived email messages for someone using Microsoft Outlook?

Options:

A.

Outlook bak

B.

Outlook ost

C.

Outlook NK2

D.

Outlook pst

Buy Now
Question # 60

Which of the following tool enables data acquisition and duplication?

Options:

A.

Colasoft’s Capsa

B.

DriveSpy

C.

Wireshark

D.

Xplico

Buy Now
Question # 61

How many times can data be written to a DVD+R disk?

Options:

A.

Twice

B.

Once

C.

Zero

D.

Infinite

Buy Now
Question # 62

Which of the following is a list of recently used programs or opened files?

Options:

A.

Most Recently Used (MRU)

B.

Recently Used Programs (RUP)

C.

Master File Table (MFT)

D.

GUID Partition Table (GPT)

Buy Now
Question # 63

What type of analysis helps to identify the time and sequence of events in an investigation?

Options:

A.

Time-based

B.

Functional

C.

Relational

D.

Temporal

Buy Now
Exam Code: 312-49v9
Exam Name: Computer Hacking Forensic Investigator (v9)
Last Update: Feb 23, 2025
Questions: 589
312-49v9 pdf

312-49v9 PDF

$25.5  $84.99
312-49v9 Engine

312-49v9 Testing Engine

$28.5  $94.99
312-49v9 PDF + Engine

312-49v9 PDF + Testing Engine

$40.5  $134.99