EC-Council 312-49V9 Exam Questions
ECCouncil Computer Hacking Forensic Investigator (V9) (Page 13 )

Updated On: 17-Feb-2026

Which of the following is the certifying body of forensics labs that investigate criminal cases by analyzing evidence?

  1. The American Society of Crime Laboratory Directors (ASCLD)
  2. International Society of Forensics Laboratory (ISFL)
  3. The American Forensics Laboratory Society (AFLS)
  4. The American Forensics Laboratory for Computer Forensics (AFLCF)

Answer(s): A



When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.

  1. 4902
  2. 3902
  3. 4904
  4. 3904

Answer(s): A



MAC filtering is a security access control methodology, where a ___________ is assigned to each network card to determine access to the network

  1. 16-bit address
  2. 24-bit address
  3. 32-bit address
  4. 48-bit address

Answer(s): D



Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where, "X" represents the _________.

  1. Drive name
  2. Sequential number
  3. Original file name's extension
  4. Original file name

Answer(s): A



Wireless access control attacks aim to penetrate a network by evading WLAN access control measures, such as AP MAC filters and Wi-Fi port access controls.
Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure the employees of the organization to connect to it?

  1. War driving
  2. Rogue access points
  3. MAC spoofing
  4. Client mis-association

Answer(s): D






Post your Comments and Discuss EC-Council 312-49V9 exam dumps with other Community members:

Join the 312-49V9 Discussion