Free 312-49v10 Exam Braindumps

Pass your Computer Hacking Forensic Investigator (CHFI-v10) exam with these free Questions and Answers

Page 2 of 141
QUESTION 1

- (Exam Topic 3)
Which of the following is NOT an anti-forensics technique?

  1. A. Data Deduplication
  2. B. Steganography
  3. C. Encryption
  4. D. Password Protection

Correct Answer: A

QUESTION 2

- (Exam Topic 2)
In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

  1. A. The change in the routing fabric to bypass the affected router
  2. B. More RESET packets to the affected router to get it to power back up
  3. C. RESTART packets to the affected router to get it to power back up
  4. D. STOP packets to all other routers warning of where the attack originated

Correct Answer: A

QUESTION 3

- (Exam Topic 4)
Mark works for a government agency as a cyber-forensic investigator. He has been given the task of restoring data from a hard drive. The partition of the hard drive was deleted by a disgruntled employee In order to hide their nefarious actions. What tool should Mark use to restore the data?

  1. A. EFSDump
  2. B. Diskmon D
  3. C. iskvlew
  4. D. R-Studio

Correct Answer: D

QUESTION 4

- (Exam Topic 1)
The offset in a hexadecimal code is:

  1. A. The last byte after the colon
  2. B. The 0x at the beginning of the code
  3. C. The 0x at the end of the code
  4. D. The first byte after the colon

Correct Answer: B

QUESTION 5

- (Exam Topic 1)
Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.
Bill protects the PDF documents with a password and sends them to their intended recipients. Why PDF passwords do not offer maximum protection?

  1. A. PDF passwords can easily be cracked by software brute force tools
  2. B. PDF passwords are converted to clear text when sent through E-mail
  3. C. PDF passwords are not considered safe by Sarbanes-Oxley
  4. D. When sent through E-mail, PDF passwords are stripped from the document completely

Correct Answer: A

Page 2 of 141

Post your Comments and Discuss EC-Council 312-49v10 exam with other Community members: