EC-Council 312-49v10 Exam Questions
Computer Hacking Forensic Investigator (Page 5 )

Updated On: 15-Feb-2026

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded.
What can the investigator do to prove the violation?

  1. Image the disk and try to recover deleted les
  2. Seek the help of co-workers who are eye-witnesses
  3. Check the Windows registry for connection data (you may or may not recover)
  4. Approach the websites for evidence

Answer(s): A



A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence.

  1. blackout attack
  2. automated attack
  3. distributed attack
  4. central processing attack

Answer(s): B



The offset in a hexadecimal code is:

  1. The last byte after the colon
  2. The 0x at the beginning of the code
  3. The 0x at the end of the code
  4. The rst byte after the colon

Answer(s): B



It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner?

  1. by law, three
  2. quite a few
  3. only one
  4. at least two

Answer(s): C



With the standard Linux second extended le system (Ext2fs), a le is deleted when the inode internal link count reaches ________.

  1. 0
  2. 10
  3. 100
  4. 1

Answer(s): A






Post your Comments and Discuss EC-Council 312-49v10 exam dumps with other Community members:

Join the 312-49v10 Discussion