312-49v10 Dumps

312-49v10 Free Practice Test

EC-Council 312-49v10: Computer Hacking Forensic Investigator (CHFI-v10)

QUESTION 206

- (Exam Topic 1)
What happens when a file is deleted by a Microsoft operating system using the FAT file system?

Correct Answer: A

QUESTION 207

- (Exam Topic 3)
Steve, a forensic investigator, was asked to investigate an email incident in his organization. The organization has Microsoft Exchange Server deployed for email communications. Which among the following files will Steve check to analyze message headers, message text, and standard attachments?

Correct Answer: B

QUESTION 208

- (Exam Topic 2)
Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where “x” represents the ________.

Correct Answer: A

QUESTION 209

- (Exam Topic 3)
Buffer overflow vulnerabilities, of web applications, occurs when the application fails to guard its buffer properly and allows writing beyond its maximum size. Thus, it overwrites the ______. There are multiple forms of buffer overflow, including a Heap Buffer Overflow and a Format String Attack.

Correct Answer: D

QUESTION 210

- (Exam Topic 2)
What is one method of bypassing a system BIOS password?

Correct Answer: B