Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: big60

Page: 1 / 26

CHFI v10 Computer Hacking Forensic Investigator (CHFI-v10)

Computer Hacking Forensic Investigator (CHFI-v10)

Last Update Apr 12, 2024
Total Questions : 704

To help you prepare for the 312-49v10 ECCouncil exam, we are offering free 312-49v10 ECCouncil exam questions. All you need to do is sign up, provide your details, and prepare with the free 312-49v10 practice questions. Once you have done that, you will have access to the entire pool of Computer Hacking Forensic Investigator (CHFI-v10) 312-49v10 test questions which will help you better prepare for the exam. Additionally, you can also find a range of Computer Hacking Forensic Investigator (CHFI-v10) resources online to help you better understand the topics covered on the exam, such as Computer Hacking Forensic Investigator (CHFI-v10) 312-49v10 video tutorials, blogs, study guides, and more. Additionally, you can also practice with realistic ECCouncil 312-49v10 exam simulations and get feedback on your progress. Finally, you can also share your progress with friends and family and get encouragement and support from them.

Questions 4

You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

Options:

A.  

Polymorphic

B.  

Metamorphic

C.  

Oligomorhic

D.  

Transmorphic

Discussion 0
Questions 5

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.

Options:

A.  

Routing Table

B.  

Firewall log

C.  

Configuration files

D.  

Email Header

Discussion 0
Questions 6

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111

TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF

***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32

TCP Options (3) => NOP NOP TS: 23678634 2878772

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111

UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84

Len: 64

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................

00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................

00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................

00 00 00 11 00 00 00 00 ........

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773

UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104

Len: 1084

47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

Options:

A.  

The attacker has conducted a network sweep on port 111

B.  

The attacker has scanned and exploited the system using Buffer Overflow

C.  

The attacker has used a Trojan on port 32773

D.  

The attacker has installed a backdoor

Discussion 0
Questions 7

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.

What countermeasures could he take to prevent DDoS attacks?

Options:

A.  

Enable direct broadcasts

B.  

Disable direct broadcasts

C.  

Disable BGP

D.  

Enable BGP

Discussion 0
Rosalie
I passed. I would like to tell all students that they should definitely give Cramkey Dumps a try.
Maja (not set)
That sounds great. I'll definitely check them out. Thanks for the suggestion!
Alaya
Best Dumps among other dumps providers. I like it so much because of their authenticity.
Kaiden (not set)
That's great. I've used other dump providers in the past and they were often outdated or had incorrect information. This time I will try it.
Annabel
I recently used them for my exam and I passed it with excellent score. I am impressed.
Amirah (not set)
I passed too. The questions I saw in the actual exam were exactly the same as the ones in the Cramkey Dumps. I was able to answer the questions confidently because I had already seen and studied them.
Reeva
Wow what a success I achieved today. Thank you so much Cramkey for amazing Dumps. All students must try it.
Amari (not set)
Wow, that's impressive. I'll definitely keep Cramkey in mind for my next exam.
Vienna
I highly recommend them. They are offering exact questions that we need to prepare our exam.
Jensen (not set)
That's great. I think I'll give Cramkey a try next time I take a certification exam. Thanks for the recommendation!
Title
Questions
Posted

312-49v10
PDF

$40  $99.99

312-49v10 Testing Engine

$48  $119.99

312-49v10 PDF + Testing Engine

$64  $159.99