EC-Council 312-49V9 Exam Questions
ECCouncil Computer Hacking Forensic Investigator (V9) (Page 3 )

Updated On: 17-Feb-2026

First responder is a person who arrives first at the crime scene and accesses the victim's computer system after the incident. He or She is responsible for protecting, integrating, and preserving the evidence obtained from the crime scene.
Which of the following is not a role of first responder?

  1. Identify and analyze the crime scene
  2. Protect and secure the crime scene
  3. Package and transport the electronic evidence to forensics lab
  4. Prosecute the suspect in court of law

Answer(s): D



Smith, an employee of a reputed forensic Investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in hacking of organization DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of the following registry key Smith will check to find the above information?

  1. UserAssist Key
  2. MountedDevices key
  3. RunMRU key
  4. TypedURLs key

Answer(s): C



What document does the screenshot represent?

  1. Chain of custody form
  2. Search warrant form
  3. Evidence collection form
  4. Expert witness form

Answer(s): A



Which of the following commands shows you all of the network services running on Windows-based servers?

  1. Net start
  2. Net use
  3. Net Session
  4. Net share

Answer(s): A



Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications.
Which data compression technique maintains data integrity?

  1. Lossless compression
  2. Lossy compression
  3. Speech encoding compression
  4. Lossy video compression

Answer(s): A






Post your Comments and Discuss EC-Council 312-49V9 exam dumps with other Community members:

Join the 312-49V9 Discussion