Certification Practice Test | PDF Questions | Actual Questions | Test Engine | Pass4Sure
312-49v10 : Computer Hacking Forensic Investigator (CHFI-v10) Exam
EC-Council 312-49v10 Questions & Answers
Full Version: 200 Q&A
Latest 312-49v10 Practice Tests with Actual Questions
Get Complete pool of questions with Premium PDF and Test Engine
Exam Code : 312-49v10
Exam Name : Computer Hacking Forensic Investigator (CHFI-v10)
Vendor Name :
"EC-Council"
312-49v10 Dumps
312-49v10 Braindumps 312-49v10 Real Questions 312-49v10 Practice Test
312-49v10 Actual Questions
killexams.com
EC-Council
312-49v10
Computer Hacking Forensic Investigator (CHFI-v10)
https://killexams.com/pass4sure/exam-detail/312-49v10
Question: 90
Kyle is performing the final testing of an application he developed for the accounting department.
His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command. What is he testing at this point?
#include #include int main(int argc, char
*argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s stringn", argv[0]); return 1; } strcpy(buffer, argv[1]); return 0; }
Buffer overflow
SQL injection
Format string bug
Kernal injection
Answer: A
Question: 91
After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet.
Why is that?
Stateful firewalls do not work with packet filtering firewalls
NAT does not work with stateful firewalls
IPSEC does not work with packet filtering firewalls
NAT does not work with IPSEC
Answer: D
Question: 92
You are the security analyst working for a private company out of France. Your current assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank security defenses are very strong and would take too long to penetrate. You decide to get the information by monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic, you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and
passwords.
What tool could you use to get this information?
Airsnort
Snort
Ettercap
RaidSniff
Answer: C
Question: 93
What TCP/UDP port does the toolkit program netstat use?
Port 7
Port 15
Port 23
Port 69
Answer: B
Question: 94
Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server.
Why will Jonathan not succeed?
Only an HTTPS session can be hijacked
HTTP protocol does not maintain session
Only FTP traffic can be hijacked
Only DNS traffic can be hijacked
Answer: B
Question: 95
You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers.
What type of firewall must you implement to abide by this policy?
Packet filtering firewall
Circuit-level proxy firewall
Application-level proxy firewall
Stateful firewall
Answer: D
Question: 96
Printing under a Windows Computer normally requires which one of the following files types to be created?
EME
MEM
EMF
CME
Answer: C
Question: 97
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related.
What organization should Frank submit the log to find out if it is a new vulnerability or not?
APIPA
IANA
CVE
RIPE
Answer: C
Question: 98
Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces.
What could have prevented this information from being stolen from the laptops?
EFS Encryption
DFS Encryption
IPS Encryption
SDW Encryption
Answer: A
Question: 99
This organization maintains a database of hash signatures for known software.
International Standards Organization
Institute of Electrical and Electronics Engineers
National Software Reference Library
American National standards Institute
Answer: C
Question: 100
You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe.
What are you trying to accomplish here?
Poison the DNS records with false records
Enumerate MX and A records from DNS
Establish a remote connection to the Domain Controller
Enumerate domain user accounts and built-in groups
Answer: D
User: Ashley***** Leading a ship or piloting a plane both require skilled captains or pilots. For me, Killexams.com acted as my captain or pilot, guiding me in the right direction before my 312-49v10 exam. It was their directions and guidance that helped me stay on track and achieve success. Passing my 312-49v10 exam was a moment of glory for which I will always be grateful to this online study center. |
User: Helen***** I never thought that I would be able to answer all the questions on the 312-49v10 exam easily. Thanks to Killexams, I was able to grasp the concepts thoroughly and even answer the unknown questions with confidence. The practice test was customized to meet my educational needs, and I found 90% of the questions to be familiar. This helped. |
User: Nastasya***** My name is Suman Kumar, and I obtained 89.25% in the 312-49V10 exam using Killexams.com test material. I am grateful for the valuable exam practice test, as the explanations to the answers were excellent. Killexams.com provided me with outstanding questions and answers, and the unique feature of this question bank is the distinct answers that helped me understand the concepts and mathematical calculations better. |
User: Daniel***** My experience with Killexams.com has been nothing but pleasant. I used the practice resources they offered for the 312-49V10 exam and was impressed with the quality of their study materials, exam engine, and every little detail they provided. Their excellent approach enabled me to become proficient in the 312-49V10 exam curriculum in a matter of days, resulting in me receiving the 312-49V10 certification with excellent marks. I owe my gratitude to every individual who contributed to the Killexams.com platform. |
User: Sascha***** Recently, I purchased the certification package from killexams.com, studied it thoroughly, and passed the 312-49v10 exam last week to obtain my certification. The online exam simulator from killexams.com was an excellent tool that boosted my confidence, and I easily passed the certification exam. I highly recommend it! |
Features of iPass4sure 312-49v10 Exam
- Files: PDF / Test Engine
- Premium Access
- Online Test Engine
- Instant download Access
- Comprehensive Q&A
- Success Rate
- Real Questions
- Updated Regularly
- Portable Files
- Unlimited Download
- 100% Secured
- Confidentiality: 100%
- Success Guarantee: 100%
- Any Hidden Cost: $0.00
- Auto Recharge: No
- Updates Intimation: by Email
- Technical Support: Free
- PDF Compatibility: Windows, Android, iOS, Linux
- Test Engine Compatibility: Mac / Windows / Android / iOS / Linux
Premium PDF with 200 Q&A
Get Full VersionAll EC-Council Exams
EC-Council ExamsCertification and Entry Test Exams
Complete exam list