EC-Council 312-49V9 Exam Questions
ECCouncil Computer Hacking Forensic Investigator (V9) (Page 18 )

Updated On: 15-Feb-2026

In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?

  1. Obtain search warrant
  2. Evaluate and secure the scene
  3. Collect the evidence
  4. Acquire the data

Answer(s): D



Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data.

  1. True
  2. False

Answer(s): A



When the operating system marks cluster as used, but does not allocate them to any file, such clusters are known as ___________.

  1. Lost clusters
  2. Bad clusters
  3. Empty clusters
  4. Unused clusters

Answer(s): A



Cyber-crime is defined as any Illegal act involving a gun, ammunition, or its applications.

  1. True
  2. False

Answer(s): B



Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___________to transfer log messages in a clear text format.

  1. TCP
  2. FTP
  3. SMTP
  4. POP

Answer(s): A






Post your Comments and Discuss EC-Council 312-49V9 exam dumps with other Community members:

Join the 312-49V9 Discussion