Pass4itsure > EC-COUNCIL > EC-COUNCIL Certifications > 312-49V8 > 312-49V8 Online Practice Questions and Answers

312-49V8 Online Practice Questions and Answers

Questions 4

FAT32 is a 32-bit version of FAT file system using smaller clusters and results in efficient storage capacity. What is the maximum drive size supported?

A. 1 terabytes

B. 2 terabytes

C. 3 terabytes

D. 4 terabytes

Buy Now
Questions 5

When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called "INF02" in the Recycled folder. If the INF02 file is deleted, it is re-created when you___________.

A. Restart Windows

B. Kill the running processes in Windows task manager

C. Run the antivirus tool on the system

D. Run the anti-spyware tool on the system

Buy Now
Questions 6

Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?

A. Substitution techniques

B. Transform domain techniques

C. Cover generation techniques

D. Spread spectrum techniques

Buy Now
Questions 7

When dealing with the powered-off computers at the crime scene, if the computer is switched off, turn it on

A. True

B. False

Buy Now
Questions 8

Attackers can manipulate variables that reference files with "dot-dot-slash (./)" sequences and their

variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.

Identify the attack referred.

A. Directory traversal

B. SQL Injection

C. XSS attack

D. File injection

Buy Now
Questions 9

The Electronic Serial Number (ESN) is a unique __________ recorded on a secure chip in a mobile phone by the manufacturer.

A. 16-bit identifier

B. 24-bit identifier

C. 32-bit identifier

D. 64-bit identifier

Buy Now
Questions 10

Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.

A. True

B. False

Buy Now
Questions 11

Digital photography helps in correcting the perspective of the Image which Is used In taking the measurements of the evidence. Snapshots of the evidence and incident-prone areas need to be taken to help in the forensic process. Is digital photography accepted as evidence in the court of law?

A. Yes

B. No

Buy Now
Questions 12

What is the first step that needs to be carried out to crack the password?

A. A word list is created using a dictionary generator program or dictionaries

B. The list of dictionary words is hashed or encrypted

C. The hashed wordlist is compared against the target hashed password, generally one word at a time

D. If it matches, that password has been cracked and the password cracker displays the unencrypted version of the password

Buy Now
Questions 13

Digital evidence validation involves using a hashing algorithm utility to create a binary or hexadecimal number that represents the uniqueness of a data set, such as a disk drive or file. Which of the following hash algorithms produces a message digest that is 128 bits long?

A. CRC-32

B. MD5

C. SHA-1

D. SHA-512

Buy Now
Exam Code: 312-49V8
Exam Name: EC-Council Certified Computer Hacking Forensic Investigator (V8)
Last Update: Jan 04, 2025
Questions: 180
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99