Want to know Examcollection 312-49v8 Exam practice test features? Want to lear more about EC-Council Computer Hacking Forensic Investigator Exam certification experience? Study Realistic EC-Council 312-49v8 answers to Most recent 312-49v8 questions at Examcollection. Gat a success with an absolute guarantee to pass EC-Council 312-49v8 (Computer Hacking Forensic Investigator Exam) test on your first attempt.

2021 Nov 312-49v8 question

Q71. An image is an artifact that reproduces the likeness of some subject. These are produced by optical devices (i.e. cameras, mirrors, lenses, telescopes, and microscopes). 

Which property of the image shows you the number of colors available for each pixel in an image? 

A. Pixel 

B. Bit Depth 

C. File Formats 

D. Image File Size 

Answer:


Q72. Which of the following statements is not a part of securing and evaluating electronic crime scene checklist? 

A. Locate and help the victim 

B. Transmit additional flash messages to other responding units 

C. Request additional help at the scene if needed 

D. Blog about the incident on the internet 

Answer:


Q73. The Recycle Bin exists as a metaphor for throwing files away, but it also allows user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. 

Which of the following files contains records that correspond to each deleted file in the Recycle Bin? 

A. INFO2 file 

B. INFO1 file 

C. LOGINFO2 file 

D. LOGINFO1 file 

Answer:


Q74. According to US federal rules, to present a testimony in a court of law, an expert witness needs to furnish certain information to prove his eligibility. Jason, a qualified computer forensic expert who has started practicing two years back, was denied an expert testimony in a computer crime case by the US Court of Appeals for the Fourth Circuit in Richmond, Virginia. Considering the US federal rules, what could be the most appropriate reason for the court to reject Jason's eligibility as an expert witness? 

A. Jason was unable to furnish documents showing four years of previous experience in the field 

B. Being a computer forensic expert, Jason is not eligible to present testimony in a computer crime case 

C. Jason was unable to furnish documents to prove that he is a computer forensic expert 

D. Jason was not aware of legal issues involved with computer crimes 

Answer:


Q75. You can interact with the Registry through intermediate programs. Graphical user interface (GUI) Registry editors such as Regedit.exe or Regedt32 exe are commonly used as intermediate programs in Windows 7. Which of the following is a root folder of the registry editor? 

A. HKEY_USERS 

B. HKEY_LOCAL_ADMIN 

C. HKEY_CLASSES_ADMIN 

D. HKEY_CLASSES_SYSTEM 

Answer:


Improved 312-49v8 test preparation:

Q76. Which of the following passwords are sent over the wire (and wireless) network, or stored on some media as it is typed without any alteration? 

A. Clear text passwords 

B. Obfuscated passwords 

C. Hashed passwords 

D. Hex passwords 

Answer:


Q77. WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2? 

A. RC4-CCMP 

B. RC4-TKIP 

C. AES-CCMP 

D. AES-TKIP 

Answer:


Q78. Which of the following file in Novel GroupWise stores information about user accounts? 

A. ngwguard.db 

B. gwcheck.db 

C. PRIV.EDB 

D. PRIV.STM 

Answer:


Q79. Billy, a computer forensics expert, has recovered a large number of DBX files during forensic investigation of a laptop. Which of the following email clients he can use to analyze the DBX files? 

A. Microsoft Outlook 

B. Microsoft Outlook Express 

C. Mozilla Thunderoird 

D. Eudora 

Answer:


Q80. When a file or folder is deleted, the complete path, including the original file name, is stored in a special hidden file called "INF02" in the Recycled folder. If the INF02 file is deleted, it is re-created when you___________. 

A. Restart Windows 

B. Kill the running processes in Windows task manager 

C. Run the antivirus tool on the system 

D. Run the anti-spyware tool on the system 

Answer: