Download Computer Hacking Forensic Investigator.312-49v10.ExamTopics.2026-05-05.610q.vcex

Vendor: ECCouncil
Exam Code: 312-49v10
Exam Name: Computer Hacking Forensic Investigator
Date: May 05, 2026
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?
  1. Title 18, Section 1030
  2. Title 18, Section 2703(d)
  3. Title 18, Section Chapter 90
  4. Title 18, Section 2703(f)
Correct answer: D
Explanation:
D: 2 - Mosted
Question 2
You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data.
What method would be most efficient for you to acquire digital evidence from this network?
  1. create a compressed copy of the file with DoubleSpace
  2. create a sparse data copy of a folder or file
  3. make a bit-stream disk-to-image file
  4. make a bit-stream disk-to-disk file
Correct answer: C
Explanation:
C: 4 - Mosted
Question 3
What file structure database would you expect to find on floppy disks?
  1. NTFS
  2. FAT32
  3. FAT16
  4. FAT12
Correct answer: D
Explanation:
D: 2 - Mosted
Question 4
Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
  1. 18 U.S.C. 1029 Possession of Access Devices
  2. 18 U.S.C. 1030 Fraud and related activity in connection with computers
  3. 18 U.S.C. 1343 Fraud by wire, radio or television
  4. 18 U.S.C. 1361 Injury to Government Property
  5. 18 U.S.C. 1362 Government communication systems
  6. 18 U.S.C. 1831 Economic Espionage Act
  7. 18 U.S.C. 1832 Trade Secrets Act
Correct answer: C
Explanation:
C: 3 - Mosted
Question 5
You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?
  1. Packet filtering firewall
  2. Circuit-level proxy firewall
  3. Application-level proxy firewall
  4. Stateful firewall
Correct answer: D
Explanation:
B: 1D: 2 - Mosted
Question 6
After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?
  1. Only IBM AS/400 will reply to this scan
  2. Only Windows systems will reply to this scan
  3. A switched network will not respond to packets sent to the broadcast address
  4. Only Unix and Unix-like systems will reply to this scan
Correct answer: C
Explanation:
C: 7 - Mosted
Question 7
Why should you never power on a computer that you need to acquire digital evidence from?
  1. When the computer boots up, files are written to the computer rendering the data nclean
  2. When the computer boots up, the system cache is cleared which could destroy evidence
  3. When the computer boots up, data in the memory buffer is cleared which could destroy evidence
  4. Powering on a computer has no affect when needing to acquire digital evidence from it
Correct answer: C
Explanation:
A: 5C: 5 - Mosted
Question 8
What is the slave device connected to the secondary IDE controller on a Linux OS referred to?
  1. hda
  2. hdd
  3. hdb
  4. hdc
Correct answer: B
Explanation:
B: 2C: 2 - Mosted
Question 9
What advantage does the tool Evidor have over the built-in Windows search?
  1. It can find deleted files even after they have been physically removed
  2. It can find bad sectors on the hard drive
  3. It can search slack space
  4. It can find files hidden within ADS
Correct answer: C
Explanation:
C: 3D: 2 - Mosted
Question 10
While searching through a computer under investigation, you discover numerous files that appear to have had the first letter of the file name replaced by the hex code byte 5h. What does this indicate on the computer?
  1. The files have been marked as hidden
  2. The files have been marked for deletion
  3. The files are corrupt and cannot be recovered
  4. The files have been marked as read-only
Correct answer: B
Explanation:
A: 2B: 3 - Mosted
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!