312-49v10 Dumps

312-49v10 Free Practice Test

EC-Council 312-49v10: Computer Hacking Forensic Investigator (CHFI-v10)

QUESTION 211

- (Exam Topic 2)
Which of the following technique creates a replica of an evidence media?

Correct Answer: C

QUESTION 212

- (Exam Topic 2)
When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote?

Correct Answer: D

QUESTION 213

- (Exam Topic 2)
A computer forensics investigator is inspecting the firewall logs for a large financial institution that has employees working 24 hours a day, 7 days a week.
312-49v10 dumps exhibit
What can the investigator infer from the screenshot seen below?

Correct Answer: C

QUESTION 214

- (Exam Topic 2)
During an investigation, an employee was found to have deleted harassing emails that were sent to someone else. The company was using Microsoft Exchange and had message tracking enabled. Where could the investigator search to find the message tracking log file on the Exchange server?

Correct Answer: A

QUESTION 215

- (Exam Topic 2)
Which password cracking technique uses details such as length of password, character sets used to construct the password, etc.?

Correct Answer: A