Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > EC-COUNCIL > EC-COUNCIL Certifications > 312-49V8 > 312-49V8 Online Practice Questions and Answers

312-49V8 Online Practice Questions and Answers

Questions 4

Jason, a renowned forensic investigator, is investigating a network attack that resulted in the compromise of several systems in a reputed multinational's network. He started Wireshark to capture the network traffic. Upon investigation, he found that the DNS packets travelling across the network belonged to a non-company configured IP. Which of the following attack Jason can infer from his findings?

A. DNS Poisoning

B. Cookie Poisoning Attack

C. DNS Redirection

D. Session poisoning

Buy Now

Correct Answer: A

Questions 5

Which table is used to convert huge word lists (i .e. dictionary files and brute-force lists) into password hashes?

A. Rainbow tables

B. Hash tables

C. Master file tables

D. Database tables

Buy Now

Correct Answer: A

Questions 6

Physical security recommendations: There should be only one entrance to a forensics lab

A. True

B. False

Buy Now

Correct Answer: A

Questions 7

Data compression involves encoding the data to take up less storage space and less bandwidth for transmission. It helps in saving cost and high data manipulation in many business applications.

Which data compression technique maintains data integrity?

A. Lossless compression

B. Lossy compression

C. Speech encoding compression

D. Lossy video compression

Buy Now

Correct Answer: A

Questions 8

Smith, as a part his forensic investigation assignment, has seized a mobile device. He was asked to recover the Subscriber Identity Module (SIM card) data the mobile device. Smith found that the SIM was protected by a Personal identification Number (PIN) code but he was also aware that people generally leave the PIN numbers to the defaults or use easily guessable numbers such as 1234. He unsuccessfully tried three PIN numbers that blocked the SIM card. What Jason can do in this scenario to reset the PIN and access SIM data?

A. He should contact the device manufacturer for a Temporary Unlock Code (TUK) to gain access to the SIM

B. He cannot access the SIM data in this scenario as the network operators or device manufacturers have no idea about a device PIN

C. He should again attempt PIN guesses after a time of 24 hours

D. He should ask the network operator for Personal Unlock Number (PUK) to gain access to the SIM

Buy Now

Correct Answer: D

Questions 9

Dumpster Diving refers to:

A. Searching for sensitive information in the user's trash bins and printer trash bins, and searching the user's desk for sticky notes

B. Looking at either the user's keyboard or screen while he/she is logging in

C. Convincing people to reveal the confidential information

D. Creating a set of dictionary words and names, and trying all the possible combinations to crack the password

Buy Now

Correct Answer: A

Questions 10

Steganography is a technique of hiding a secret message within an ordinary message and extracting it at the destination to maintain the confidentiality of data.

A. True

B. False

Buy Now

Correct Answer: A

Questions 11

Hard disk data addressing is a method of allotting addresses to each ___________of data on a hard disk

A. Physical block

B. Logical block

C. Operating system block

D. Hard disk block

Buy Now

Correct Answer: A

Questions 12

How do you define Technical Steganography?

A. Steganography that uses physical or chemical means to hide the existence of a message

B. Steganography that utilizes written natural language to hide the message in the carrier in some non-obvious ways

C. Steganography that utilizes written JAVA language to hide the message in the carrier in some non-obvious ways

D. Steganography that utilizes visual symbols or signs to hide secret messages

Buy Now

Correct Answer: A

Questions 13

Netstat is a tool for collecting Information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics.

Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

A. netstat -ano

B. netstat -b

C. netstat -r

D. netstat -s

Buy Now

Correct Answer: A

Exam Code: 312-49V8
Exam Name: EC-Council Certified Computer Hacking Forensic Investigator (V8)
Last Update: Jun 10, 2025
Questions: 180

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.