312-49v10 Dumps

312-49v10 Free Practice Test

EC-Council 312-49v10: Computer Hacking Forensic Investigator (CHFI-v10)

QUESTION 276

- (Exam Topic 2)
Who is responsible for the following tasks?

Correct Answer: A

QUESTION 277

- (Exam Topic 1)
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

Correct Answer: D

QUESTION 278

- (Exam Topic 2)
On an Active Directory network using NTLM authentication, where on the domain controllers are the passwords stored?

Correct Answer: A

QUESTION 279

- (Exam Topic 3)
Report writing is a crucial stage in the outcome of an investigation. Which information should not be included in the report section?

Correct Answer: A

QUESTION 280

- (Exam Topic 3)
An investigator is analyzing a checkpoint firewall log and comes across symbols. What type of log is he looking at?
312-49v10 dumps exhibit

Correct Answer: C