EC-Council 312-49 Exam
Computer Hacking Forensic Investigator (Page 14 )

Updated On: 9-Feb-2026

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?

  1. forensic duplication of hard drive
  2. analysis of volatile data
  3. comparison of MD5 checksums
  4. review of SIDs in the Registry

Answer(s): C



Which response organization tracks hoaxes as well as viruses?

  1. NIPC
  2. FEDCIRC
  3. CERT
  4. CIAC

Answer(s): D



Which federal computer crime law specifically refers to fraud and related activity in connection with access devices like routers?

  1. 18 U.S.C. 1029
  2. 18 U.S.C. 1362
  3. 18 U.S. 2511
  4. 18 U.S.C. 2703

Answer(s): A



Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document. What is that code called?

  1. the Microsoft Virtual Machine Identifier
  2. the Personal Application Protocol
  3. the Globally Unique ID
  4. the Individual ASCII String

Answer(s): C



What TCP/UDP port does the toolkit program netstat use?

  1. Port 7
  2. Port 15
  3. Port 23
  4. Port 69

Answer(s): B






Post your Comments and Discuss EC-Council 312-49 exam prep with other Community members:

Join the 312-49 Discussion