Eccouncil 312-49v9 practice test

Computer Hacking Forensic Investigator

Last exam update: Nov 18 ,2025
Page 1 out of 40. Viewing questions 1-15 out of 589

Question 1

What type of attack occurs when an attacker can force a router to stop forwarding packets by
flooding the router with many open connections simultaneously so that all the hosts behind the
router are effectively disabled?

  • A. digital attack
  • B. denial of service
  • C. physical attack
  • D. ARP redirect
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

When examining a file with a Hex Editor, what space does the file header occupy?

  • A. the last several bytes of the file
  • B. the first several bytes of the file
  • C. none, file headers are contained in the FAT
  • D. one byte at the beginning of the file
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

In the context of file deletion process, which of the following statement holds true?

  • A. When files are deleted, the data is overwritten and the cluster marked as available
  • B. The longer a disk is in use, the less likely it is that deleted files will be overwritten
  • C. While booting, the machine may create temporary files that can delete evidence
  • D. Secure delete programs work by completely overwriting the file in one go
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult
websites and downloaded images. The investigator wants to demonstrate that the suspect did
indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie
cache. Moreover, he has removed any images he might have downloaded. What can the investigator
do to prove the violation?

  • A. Image the disk and try to recover deleted files
  • B. Seek the help of co-workers who are eye-witnesses
  • C. Check the Windows registry for connection data (you may or may not recover)
  • D. Approach the websites for evidence
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

A(n) _____________________ is one that's performed by a computer program rather than the
attacker manually performing the steps in the attack sequence.

  • A. blackout attack
  • B. automated attack
  • C. distributed attack
  • D. central processing attack
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

The offset in a hexadecimal code is:

  • A. The last byte after the colon
  • B. The 0x at the beginning of the code
  • C. The 0x at the end of the code
  • D. The first byte after the colon
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

It takes _____________ mismanaged case/s to ruin your professional reputation as a computer
forensics examiner?

  • A. by law, three
  • B. quite a few
  • C. only one
  • D. at least two
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode
internal link count reaches ________.

  • A. 0
  • B. 10
  • C. 100
  • D. 1
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

  • A. the same log is used at all times
  • B. a new log file is created everyday
  • C. a new log file is created each week
  • D. a new log is created each time the Web Server is started
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which part of the Windows Registry contains the user's password file?

  • A. HKEY_LOCAL_MACHINE
  • B. HKEY_CURRENT_CONFIGURATION
  • C. HKEY_USER
  • D. HKEY_CURRENT_USER
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital
video discs (DVDs) by using a large magnet. You inform him that this method will not be effective in
wiping out the data because CDs and DVDs are ______________ media used to store large amounts
of data and are not affected by the magnet.

  • A. logical
  • B. anti-magnetic
  • C. magnetic
  • D. optical
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Lance wants to place a honeypot on his network. Which of the following would be your
recommendations?

  • A. Use a system that has a dynamic addressing on the network
  • B. Use a system that is not directly interacting with the router
  • C. Use it on a system in an external DMZ in front of the firewall
  • D. It doesn't matter as all replies are faked
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What does the acronym POST mean as it relates to a PC?

  • A. Primary Operations Short Test
  • B. PowerOn Self Test
  • C. Pre Operational Situation Test
  • D. Primary Operating System Test
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which legal document allows law enforcement to search an office, place of business, or other locale
for evidence relating to an alleged crime?

  • A. bench warrant
  • B. wire tap
  • C. subpoena
  • D. search warrant
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

You are working as an investigator for a corporation and you have just received instructions from
your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation.
Your job is to complete the required evidence custody forms to properly document each piece of
evidence as it is collected by other members of your team. Your manager instructs you to complete
one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will
these forms be stored to help preserve the chain of custody of the case?

  • A. All forms should be placed in an approved secure container because they are now primary evidence in the case.
  • B. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.
  • C. The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.
  • D. All forms should be placed in the report file because they are now primary evidence in the case.
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2