EC-Council 312-49V9 Exam
ECCouncil Computer Hacking Forensic Investigator (V9) (Page 49 )

Updated On: 7-Feb-2026

How do you define Technical Steganography?

  1. Steganography that uses physical or chemical means to hide the existence of a message
  2. Steganography that utilizes written natural language to hide the message in the carrier in some non-obvious ways
  3. Steganography that utilizes written JAVA language to hide the message in the carrier in some non-obvious ways
  4. Steganography that utilizes visual symbols or signs to hide secret messages

Answer(s): A



Digital evidence is not fragile in nature.

  1. True
  2. False

Answer(s): B



Depending upon the Jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?

  1. 18 USC 7029
  2. 18 USC 7030
  3. 18 USC 7361
  4. 18 USC 7371

Answer(s): B



If the partition size Is 4 GB, each cluster will be 32 K. Even If a file needs only 10 K, the entire 32 K will be allocated, resulting In 22 K of___________.

  1. Slack space
  2. Deleted space
  3. Cluster space
  4. Sector space

Answer(s): A



Deposition enables opposing counsel to preview an expert witness's testimony at trial. Which of the following deposition is not a standard practice?

  1. Both attorneys are present
  2. Only one attorneys is present
  3. No jury or judge
  4. Opposing counsel asks questions

Answer(s): B






Post your Comments and Discuss EC-Council 312-49V9 exam prep with other Community members:

Join the 312-49V9 Discussion