Free 312-49v9 Exam Dumps

No Installation Required, Instantly Prepare for the 312-49v9 exam and please click the below link to start the 312-49v9 Exam Simulator with a real 312-49v9 practice exam questions.
Use directly our on-line 312-49v9 exam dumps materials and try our Testing Engine to pass the 312-49v9 which is always updated.

  • Exam Code: 312-49v9
  • Exam Title: ECCouncil Computer Hacking Forensic Investigator (V9)
  • Vendor: EC-Council
  • Exam Questions: 589
  • Last Updated: December 18th,2024

Question 1

- (Topic 1)
International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is also known as:

Correct Answer:A

Question 2

- (Topic 1)
Attacker uses vulnerabilities in the authentication or session management functions such as exposed accounts, session IDs, logout, password management, timeouts, remember me. secret question, account update etc. to impersonate users, if a user simply closes the browser without logging out from sites accessed through a public computer, attacker can use the same browser later and exploit the user's privileges. Which of the following vulnerability/exploitation is referred above?

Correct Answer:B

Question 3

- (Topic 1)
Damaged portions of a disk on which no read/Write operation can be performed is known as ____ .

Correct Answer:B

Question 4

- (Topic 2)
John is working on his company policies and guidelines. The section he is currently working on covers company documents; how they shouldJohn is working on his company? policies and guidelines. The section he is currently working on covers company documents; how they should be handled, stored, and eventually destroyed. John is concerned about the process whereby outdated documents are destroyed. What type of shredder should John write in the guidelines to be used when destroying documents?

Correct Answer:B

Question 5

- (Topic 3)
An employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the employee computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to astored on the employee? computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the employee before he leaves the building and recover the floppy disk and secure his computer. Will you be able to break the encryption so that you can verify that the employee was in possession of the proprietary information?

Correct Answer:C