Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with ValidTests

Exam 312-49v9 All Questions
Exam 312-49v9 Premium Access

View all detail and faqs for the 312-49v9 exam

Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?

Options:

A.

Data collection

B.

Secure the evidence

C.

First response

D.

Data analysis

Expert Solution
Questions # 12:

What file is processed at the end of a Windows XP boot to initialize the logon dialog box?

Options:

A.

NTOSKRNL.EXE

B.

NTLDR

C.

LSASS.EXE

D.

NTDETECT.COM

Expert Solution
Questions # 13:

Jacob is a computer forensics investigator with over 10 years experience in investigations and has written over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used for Jacob testimony in this case?

Options:

A.

Justification

B.

Authentication

C.

Reiteration

D.

Certification

Expert Solution
Questions # 14:

When a router receives an update for its routing table, what is the metric value change to that path?

Options:

A.

Increased by 2

B.

Decreased by 1

C.

Increased by 1

D.

Decreased by 2

Expert Solution
Questions # 15:

What will the following Linux command accomplish?

dd if=/dev/mem of=/home/sam/mem.bin bs=1024

Options:

A.

Copy the master boot record to a file

B.

Copy the contents of the system folder to a file

C.

Copy the running memory to a file

D.

Copy the memory dump file to an image file

Expert Solution
Questions # 16:

Which rule requires an original recording to be provided to prove the content of a recording?

Options:

A.

1004

B.

1002

C.

1003

D.

1005

Expert Solution
Questions # 17:

In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?

Options:

A.

Cloud as an Object

B.

Cloud as a Tool

C.

Cloud as an Application

D.

Cloud as a Subject

Expert Solution
Questions # 18:

An investigator has found certain details after analysis of a mobile device. What can reveal the manufacturer information?

Options:

A.

Equipment Identity Register (EIR)

B.

Electronic Serial Number (ESN)

C.

International mobile subscriber identity (IMSI)

D.

Integrated circuit card identifier (ICCID)

Expert Solution
Questions # 19:

As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?

Options:

A.

Status of users connected to the internet

B.

Net status of computer usage

C.

Information about network connections

D.

Status of network hardware

Expert Solution
Questions # 20:

What is an investigator looking for in the rp.log file stored in a system running on Windows 10 operating system?

Options:

A.

Restore point interval

B.

Automatically created restore points

C.

System CheckPoints required for restoring

D.

Restore point functions

Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 11-20 out of questions