312-49v10 Dumps

312-49v10 Free Practice Test

EC-Council 312-49v10: Computer Hacking Forensic Investigator (CHFI-v10)

QUESTION 21

- (Exam Topic 1)
The objective of this act was to protect consumers’ personal financial information held by financial institutions and their service providers.

Correct Answer: A

QUESTION 22

- (Exam Topic 2)
What encryption technology is used on Blackberry devices Password Keeper?

Correct Answer: B

QUESTION 23

- (Exam Topic 1)
Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?

Correct Answer: A

QUESTION 24

- (Exam Topic 3)
In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?

Correct Answer: D

QUESTION 25

- (Exam Topic 2)
Sectors are pie-shaped regions on a hard disk that store data. Which of the following parts of a hard disk do not contribute in determining the addresses of data?

Correct Answer: B