Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: big60

Page: 1 / 26

CHFI v10 Computer Hacking Forensic Investigator (CHFI-v10)

Computer Hacking Forensic Investigator (CHFI-v10)

Last Update Apr 17, 2024
Total Questions : 704

To help you prepare for the 312-49v10 ECCouncil exam, we are offering free 312-49v10 ECCouncil exam questions. All you need to do is sign up, provide your details, and prepare with the free 312-49v10 practice questions. Once you have done that, you will have access to the entire pool of Computer Hacking Forensic Investigator (CHFI-v10) 312-49v10 test questions which will help you better prepare for the exam. Additionally, you can also find a range of Computer Hacking Forensic Investigator (CHFI-v10) resources online to help you better understand the topics covered on the exam, such as Computer Hacking Forensic Investigator (CHFI-v10) 312-49v10 video tutorials, blogs, study guides, and more. Additionally, you can also practice with realistic ECCouncil 312-49v10 exam simulations and get feedback on your progress. Finally, you can also share your progress with friends and family and get encouragement and support from them.

Questions 4

You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

Options:

A.  

Polymorphic

B.  

Metamorphic

C.  

Oligomorhic

D.  

Transmorphic

Discussion 0
Questions 5

You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.

Options:

A.  

Routing Table

B.  

Firewall log

C.  

Configuration files

D.  

Email Header

Discussion 0
Rosalie
I passed. I would like to tell all students that they should definitely give Cramkey Dumps a try.
Maja (not set)
That sounds great. I'll definitely check them out. Thanks for the suggestion!
Inaaya
Are these Dumps worth buying?
Fraser (not set)
Yes, of course, they are necessary to pass the exam. They give you an insight into the types of questions that could come up and help you prepare effectively.
Mariam
Do anyone think Cramkey questions can help improve exam scores?
Katie (not set)
Absolutely! Many people have reported improved scores after using Cramkey Dumps, and there are also success stories of people passing exams on the first try. I already passed this exam. I confirmed above questions were in exam.
River
Hey, I used Cramkey Dumps to prepare for my recent exam and I passed it.
Lewis (not set)
Yeah, I used these dumps too. And I have to say, I was really impressed with the results.
Questions 6

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111

TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF

***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32

TCP Options (3) => NOP NOP TS: 23678634 2878772

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111

UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84

Len: 64

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 ................

00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................

00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 ................

00 00 00 11 00 00 00 00 ........

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773

UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104

Len: 1084

47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

Options:

A.  

The attacker has conducted a network sweep on port 111

B.  

The attacker has scanned and exploited the system using Buffer Overflow

C.  

The attacker has used a Trojan on port 32773

D.  

The attacker has installed a backdoor

Discussion 0
Questions 7

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.

What countermeasures could he take to prevent DDoS attacks?

Options:

A.  

Enable direct broadcasts

B.  

Disable direct broadcasts

C.  

Disable BGP

D.  

Enable BGP

Discussion 0
Title
Questions
Posted

312-49v10
PDF

$40  $99.99

312-49v10 Testing Engine

$48  $119.99

312-49v10 PDF + Testing Engine

$64  $159.99