Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

ECCouncil Updated 312-49v10 Exam Questions and Answers by wiktor

Page: 24 / 26

ECCouncil 312-49v10 Exam Overview :

Exam Name: Computer Hacking Forensic Investigator (CHFI-v10)
Exam Code: 312-49v10 Dumps
Vendor: ECCouncil Certification: CHFI v10
Questions: 704 Q&A's Shared By: wiktor
Question 96

Which of the following file system uses Master File Table (MFT) database to store information about every file and directory on a volume?

Options:

A.

FAT File System

B.

ReFS

C.

exFAT

D.

NTFS File System

Discussion
Question 97

Which of the following Windows-based tool displays who is logged onto a computer, either locally or remotely?

Options:

A.

Tokenmon

B.

PSLoggedon

C.

TCPView

D.

Process Monitor

Discussion
Question 98

Which of the following Perl scripts will help an investigator to access the executable image of a process?

Options:

A.

Lspd.pl

B.

Lpsi.pl

C.

Lspm.pl

D.

Lspi.pl

Discussion
Walter
Yayyy!!! I passed my exam with the help of Cramkey Dumps. Highly appreciated!!!!
Angus Jan 15, 2026
YES….. I saw the same questions in the exam.
Ari
Can anyone explain what are these exam dumps and how are they?
Ocean Jan 4, 2026
They're exam preparation materials that are designed to help you prepare for various certification exams. They provide you with up-to-date and accurate information to help you pass your exams.
Anaya
I found so many of the same questions on the real exam that I had already seen in the Cramkey Dumps. Thank you so much for making exam so easy for me. I passed it successfully!!!
Nina Jan 12, 2026
It's true! I felt so much more confident going into the exam because I had already seen and understood the questions.
Kingsley
Do anyone guide my how these dumps would be helpful for new students like me?
Haris Jan 12, 2026
Absolutely! They are highly recommended for anyone looking to pass their certification exam. The dumps are easy to understand and follow, making it easier for you to study and retain the information.
Question 99

Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the police, was used by a hacker who gained access to numerous banking institutions to steal customer information. After preliminary investigations, Gill finds in the computer’s log files that the hacker was able to gain access to these banks through the use of Trojan horses. The hacker then used these Trojan horses to obtain remote access to the companies’ domain controllers. From this point, Gill found that the hacker pulled off the SAM files from the domain controllers to then attempt and crack network passwords. What is the most likely password cracking technique used by this hacker to break the user passwords from the SAM files?

Options:

A.

Syllable attack

B.

Hybrid attack

C.

Brute force attack

D.

Dictionary attack

Discussion
Page: 24 / 26
Title
Questions
Posted

312-49v10
PDF

$36.75  $104.99

312-49v10 Testing Engine

$43.75  $124.99

312-49v10 PDF + Testing Engine

$57.75  $164.99