Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

Page: 1 / 26

CHFI v10 Computer Hacking Forensic Investigator (CHFI-v10)

Computer Hacking Forensic Investigator (CHFI-v10)

Last Update Jun 21, 2024
Total Questions : 704

To help you prepare for the 312-49v10 ECCouncil exam, we are offering free 312-49v10 ECCouncil exam questions. All you need to do is sign up, provide your details, and prepare with the free 312-49v10 practice questions. Once you have done that, you will have access to the entire pool of Computer Hacking Forensic Investigator (CHFI-v10) 312-49v10 test questions which will help you better prepare for the exam. Additionally, you can also find a range of Computer Hacking Forensic Investigator (CHFI-v10) resources online to help you better understand the topics covered on the exam, such as Computer Hacking Forensic Investigator (CHFI-v10) 312-49v10 video tutorials, blogs, study guides, and more. Additionally, you can also practice with realistic ECCouncil 312-49v10 exam simulations and get feedback on your progress. Finally, you can also share your progress with friends and family and get encouragement and support from them.

Questions 4

You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?










Discussion 0
Questions 5

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.



Routing Table


Firewall log


Configuration files


Email Header

Discussion 0
These Dumps are amazing! I used them to study for my recent exam and I passed with flying colors. The information in the dumps is so valid and up-to-date. Thanks a lot!!!
Zofia (not set)
That's great to hear! I've been struggling to find good study material for my exam. I will ty it for sure.
I passed my exam. Cramkey Dumps provides detailed explanations for each question and answer, so you can understand the concepts better.
Alisha (not set)
I recently used their dumps for the certification exam I took and I have to say, I was really impressed.
I tried using Cramkey dumps for my recent certification exam and I found them to be more accurate and up-to-date compared to other dumps I've seen. Passed the exam with wonderful score.
Rayyan (not set)
I see your point. Thanks for sharing your thoughts. I might give it a try for my next certification exam.
I want to ask about their study material and Customer support? Can anybody guide me?
Zayd (not set)
Yes, the dumps or study material provided by them are authentic and up to date. They have a dedicated team to assist students and make sure they have a positive experience.
Questions 6

A honey pot deployed with the IP was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

03/15-20:21:24.107053 ->

TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF

***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32

TCP Options (3) => NOP NOP TS: 23678634 2878772


03/15-20:21:24.452051 ->

UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84

Len: 64

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................

00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................

00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................

00 00 00 11 00 00 00 00 ........


03/15-20:21:24.730436 ->

UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104

Len: 1084

47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8



The attacker has conducted a network sweep on port 111


The attacker has scanned and exploited the system using Buffer Overflow


The attacker has used a Trojan on port 32773


The attacker has installed a backdoor

Discussion 0
Questions 7

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.

What countermeasures could he take to prevent DDoS attacks?



Enable direct broadcasts


Disable direct broadcasts


Disable BGP


Enable BGP

Discussion 0


$35  $99.99

312-49v10 Testing Engine

$42  $119.99

312-49v10 PDF + Testing Engine

$56  $159.99