EC-Council 312-49v10 Exam Questions
Computer Hacking Forensic Investigator (Page 14 )

Updated On: 16-Feb-2026

What method of computer forensics will allow you to trace all ever-established user accounts on a Windows 2000 sever the course of its lifetime?

  1. forensic duplication of hard drive
  2. analysis of volatile data
  3. comparison of MD5 checksums
  4. review of SIDs in the Registry

Answer(s): C



Which response organization tracks hoaxes as well as viruses?

  1. NIPC
  2. FEDCIRC
  3. CERT
  4. CIAC

Answer(s): D



Which federal computer crime law speci cally refers to fraud and related activity in connection with access devices like routers?

  1. 18 U.S.C. 1029
  2. 18 U.S.C. 1362
  3. 18 U.S. 2511
  4. 18 U.S.C. 2703

Answer(s): A



O ce documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identi er, of the machine that created the document.
What is that code called?

  1. the Microsoft Virtual Machine Identi er
  2. the Personal Application Protocol
  3. the Globally Unique ID
  4. the Individual ASCII String

Answer(s): C



What TCP/UDP port does the toolkit program netstat use?

  1. Port 7
  2. Port 15
  3. Port 23
  4. Port 69

Answer(s): B






Post your Comments and Discuss EC-Council 312-49v10 exam dumps with other Community members:

Join the 312-49v10 Discussion