312-49v10 Dumps

312-49v10 Free Practice Test

EC-Council 312-49v10: Computer Hacking Forensic Investigator (CHFI-v10)

QUESTION 111

- (Exam Topic 3)
Adam, a forensic analyst, is preparing VMs for analyzing a malware. Which of the following is NOT a best practice?

Correct Answer: D

QUESTION 112

- (Exam Topic 1)
When a file is deleted by Windows Explorer or through the MS-DOS delete command, the operating system inserts ______ in the first letter position of the filename in the FAT database.

Correct Answer: D

QUESTION 113

- (Exam Topic 2)
What does 254 represent in ICCID 89254021520014515744?

Correct Answer: B

QUESTION 114

- (Exam Topic 2)
How many possible sequence number combinations are there in TCP/IP protocol?

Correct Answer: C

QUESTION 115

- (Exam Topic 3)
Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer’s log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies’ domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?

Correct Answer: D