Ace the EC-Council CHFI-v10 Exam with ITPrepare’s Latest 312-49v10 Exam Questions

Ace the EC-Council CHFI-v10 Exam with ITPrepare’s Latest 312-49v10 Exam Questions

Pass the Computer Hacking Forensic Investigator (CHFI-v10) 312-49v10 exam with ease using ITPrepare’s newly released 312-49v10 exam questions. Our EC-Council 312-49v10 exam questions with accurate answers are available online to help you succeed in the EC-Council CHFI-v10 312-49v10 exam. Get the best preparation for your CHFI-v10 312-49v10 exam with ITPrepare’s latest 312-49v10 exam questions and increase your chances of success.

Starting Checking EC-Council 312-49v10 free demo questions online:

Page 1 of 10

1. You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your ECSA class. He asks about the methodology you will be using to test the company's network.

How would you answer?

2. You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers.

What type of firewall must you implement to abide by this policy?

3. While working for a prosecutor, what do you think you should do if the evidence you found appears to be exculpatory and is not being released to the defense?

4. Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document.

What is that code called?

5. You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement officer that responds requests that you put a network sniffer on your network and monitor all traffic to the subject’s computer.

You inform the officer that you will not be able to comply with that request because doing so would:

6. Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests.

What type of scan is Jessica going to perform?

7. You should make at least how many bit-stream copies of a suspect drive?

8. An Employee is suspected of stealing proprietary information belonging to your company that he had no rights to possess. The information was stored on the Employees Computer that was protected with the NTFS Encrypted File System (EFS) and you had observed him copy the files to a floppy disk just before leaving work for the weekend. You detain the Employee before he leaves the building and recover the floppy disks and secure his computer.

Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?

9. Diskcopy is:

10. You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network.

Why would you want to initiate a DoS attack on a system you are testing?


 

Share this post