EC-Council 312-49 Exam
Computer Hacking Forensic Investigator (Page 16 )

Updated On: 9-Feb-2026

You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?

  1. 70 years
  2. the life of the author
  3. the life of the author plus 70 years
  4. copyrights last forever

Answer(s): C



When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?

  1. on the individual computer's ARP cache
  2. in the Web Server log files
  3. in the DHCP Server log files
  4. there is no way to determine the specific IP address

Answer(s): C



Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence. The organization had used a Virtual Environment to trap Bob. What is a Virtual Environment?

  1. A Honeypot that traps hackers
  2. A system Using Trojaned commands
  3. An environment set up after the user logs in
  4. An environment set up before a user logs in

Answer(s): A



To make sure the evidence you recover and analyze with computer forensics software can be admitted in court, you must test and validate the software. What group is actively providing tools and creating procedures for testing and validating computer forensics software?

  1. Computer Forensics Tools and Validation Committee (CFTVC)
  2. Association of Computer Forensics Software Manufactures (ACFSM)
  3. National Institute of Standards and Technology (NIST)
  4. Society for Valid Forensics Tools and Testing (SVFTT)

Answer(s): C



With Regard to using an Antivirus scanner during a computer forensics investigation, You should:

  1. Scan the suspect hard drive before beginning an investigation
  2. Never run a scan on your forensics workstation because it could change your systems configuration
  3. Scan your forensics workstation at intervals of no more than once every five minutes during an investigation
  4. Scan your Forensics workstation before beginning an investigation

Answer(s): D






Post your Comments and Discuss EC-Council 312-49 exam prep with other Community members:

Join the 312-49 Discussion