312-49v10 Dumps

312-49v10 Free Practice Test

EC-Council 312-49v10: Computer Hacking Forensic Investigator (CHFI-v10)

QUESTION 71

- (Exam Topic 3)
Steve, a forensic investigator, was asked to investigate an email incident in his organization. The organization has Microsoft Exchange Server deployed for email communications. Which among the following files will Steve check to analyze message headers, message text, and standard attachments?

Correct Answer: B

QUESTION 72

- (Exam Topic 2)
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where “x” represents the ________.

Correct Answer: A

QUESTION 73

- (Exam Topic 3)
Buffer overflow vulnerabilities, of web applications, occurs when the application fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the ______. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.

Correct Answer: D

QUESTION 74

- (Exam Topic 2)
What is one method of bypassing a system BIOS password?

Correct Answer: B

QUESTION 75

- (Exam Topic 2)
Which of the following technique creates a replica of an evidence media?

Correct Answer: C