EC-Council 312-49V9 Exam Questions
ECCouncil Computer Hacking Forensic Investigator (V9) (Page 8 )

Updated On: 17-Feb-2026

An attack vector is a path or means by which an attacker can gain access to computer or network resources in order to deliver an attack payload or cause a malicious outcome.

  1. True
  2. False

Answer(s): A



Network forensics can be defined as the sniffing, recording, acquisition and analysis of the network traffic and event logs in order to investigate a network security incident.

  1. True
  2. False

Answer(s): A



Digital evidence validation involves using a hashing algorithm utility to create a binary or hexadecimal number that represents the uniqueness of a data set, such as a disk drive or file.
Which of the following hash algorithms produces a message digest that is 128 bits long?

  1. CRC-32
  2. MD5
  3. SHA-1
  4. SHA-512

Answer(s): B



LBA (Logical Block Address) addresses data by allotting a ___________to each sector of the hard disk.

  1. Sequential number
  2. Index number
  3. Operating system number
  4. Sector number

Answer(s): A



Which of the following attacks allows attacker to acquire access to the communication channels between the victim and server to extract the information?

  1. Man-in-the-middle (MITM) attack
  2. Replay attack
  3. Rainbow attack
  4. Distributed network attack

Answer(s): A






Post your Comments and Discuss EC-Council 312-49V9 exam dumps with other Community members:

Join the 312-49V9 Discussion