EC-Council 312-49V9 Exam Questions
ECCouncil Computer Hacking Forensic Investigator (V9) (Page 7 )

Updated On: 17-Feb-2026

Which of the following log injection attacks uses white space padding to create unusual log entries?

  1. Word wrap abuse attack
  2. HTML injection attack
  3. Terminal injection attack
  4. Timestamp injection attack

Answer(s): A



Subscriber Identity Module (SIM) is a removable component that contains essential information about the subscriber. Its main function entails authenticating the user of the cell phone to the network to gain access to subscribed services. SIM contains a 20-digit long Integrated Circuit Card identification (ICCID) number, identify the issuer identifier Number from the ICCID below.

  1. 89
  2. 44
  3. 245252
  4. 001451548

Answer(s): C



Recovery of the deleted partition is the process by which the investigator evaluates and extracts the deleted partitions.

  1. True
  2. False

Answer(s): A



If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?

  1. 4 Sectors
  2. 5 Sectors
  3. 6 Sectors
  4. 7 Sectors

Answer(s): C



What is a SCSI (Small Computer System Interface)?

  1. A set of ANSI standard electronic interfaces that allow personal computers to communicate with peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners
  2. A standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices
  3. A "plug-and-play" interface, which allows a device to be added without an adapter card and without rebooting the computer
  4. A point-to-point serial bi-directional interface for transmitting data between computer devices at data rates of up to 4 Gbps

Answer(s): A






Post your Comments and Discuss EC-Council 312-49V9 exam dumps with other Community members:

Join the 312-49V9 Discussion