EC-Council 312-49v10 Questions & Answers

Full Version: 200 Q&A



312-49v10 Dumps
312-49v10 Braindumps
312-49v10 Real Questions
312-49v10 Practice Test
312-49v10 Actual Questions


EC-Council
312-49v10
Computer Hacking Forensic Investigator (CHFI-v10)
https://killexams.com/pass4sure/exam-detail/312-49v10
Question: 90
Kyle is performing the final testing of an application he developed for the accounting department.
His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command.
What is he testing at this point?
#include #include int main(int argc, char
*argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s stringn", argv[0]); return 1; }
strcpy(buffer, argv[1]); return 0; }
A. Buffer overflow
B. SQL injection
C. Format string bug
D. Kernal injection
Answer: A
Question: 91
After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ,
stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts
on her network can reach the Internet.
Why is that?
A. Stateful firewalls do not work with packet filtering firewalls
B. NAT does not work with stateful firewalls
C. IPSEC does not work with packet filtering firewalls
D. NAT does not work with IPSEC
Answer: D
Question: 92
You are the security analyst working for a private company out of France. Your current assignment is to obtain credit
card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank
security defenses are very strong and would take too long to penetrate. You decide to get the information by
monitoring the traffic between the bank and one of its subsidiaries in London. After monitoring some of the traffic,
you see a lot of FTP packets traveling back and forth. You want to sniff the traffic and extract usernames and
passwords.
What tool could you use to get this information?
A. Airsnort
B. Snort
C. Ettercap
D. RaidSniff
Answer: C
Question: 93
What TCP/UDP port does the toolkit program netstat use?
A. Port 7
B. Port 15
C. Port 23
D. Port 69
Answer: B
Question: 94
Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to
hijack a session, using Ettercap, of a user connected to his Web server.
Why will Jonathan not succeed?
A. Only an HTTPS session can be hijacked
B. HTTP protocol does not maintain session
C. Only FTP traffic can be hijacked
D. Only DNS traffic can be hijacked
Answer: B
Question: 95
You are assisting a Department of Defense contract company to become compliant with the stringent security policies
set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by
internal computers.
What type of firewall must you implement to abide by this policy?
A. Packet filtering firewall
B. Circuit-level proxy firewall
C. Application-level proxy firewall
D. Stateful firewall
Answer: D
Question: 96
Printing under a Windows Computer normally requires which one of the following files types to be created?
A. EME
B. MEM
C. EMF
D. CME
Answer: C
Question: 97
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess
its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known
vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but
Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related.
What organization should Frank submit the log to find out if it is a new vulnerability or not?
A. APIPA
B. IANA
C. CVE
D. RIPE
Answer: C
Question: 98
Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained
sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a
competing company was found to have just developed products that almost exactly duplicated products that Meyer
produces.
What could have prevented this information from being stolen from the laptops?
A. EFS Encryption
B. DFS Encryption
C. IPS Encryption
D. SDW Encryption
Answer: A
Question: 99
This organization maintains a database of hash signatures for known software.
A. International Standards Organization
B. Institute of Electrical and Electronics Engineers
C. National Software Reference Library
D. American National standards Institute
Answer: C
Question: 100
You have compromised a lower-level administrator account on an Active Directory network of a small company in
Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers
on port 389 using ldp.exe.
What are you trying to accomplish here?
A. Poison the DNS records with false records
B. Enumerate MX and A records from DNS
C. Establish a remote connection to the Domain Controller
D. Enumerate domain user accounts and built-in groups
Answer: D

User: Felipe*****

The 312-49V10 exam training provided by Killexams.com was the best I have ever come across. I passed the exam with ease, with no stress, issues, or frustration. Their Question sets were valid, and my friend informed me that their cashback guarantee works as well. They make it easy to pass, and I will definitely use them for my next certification test.
User: Martina*****

I highly recommend Killexams.com as an excellent way to prepare for the 312-49v10 exam. I used this package to prepare for my 312-49v10 exam and did not set my expectations too high. I made sure to follow the professional syllabus to ensure that I did not miss any topics. Killexams.com had all the topics covered, and the coaching was very robust. On the exam day, I felt confident, and what made it even better was that the questions were exactly the same as those provided by Killexams.com. This is a terrific resource, and I highly recommend it.
User: Sveta*****

I scored 88% marks on my 312-49v10 exam, thanks to a friend who recommended using Killexams.com questions and answers. She had passed her exam using them, and I found the practice tests to be of excellent quality. Enrolling for the 312-49v10 exam was easy, but the hard part was yet to come. I had two options - enroll in standard lessons and give up my part-time job or study on my own and continue with my career. I chose the latter and found Killexams.com to be incredibly helpful.
User: Constance*****

I confidently endorse Killexams.com 312-49v10 questions, answers, and exam simulator to anyone preparing for the exam. Their material is accurate, updated, and appropriate for the exam. I passed the exam last week, and I credit my success to their excellent services.
User: Micha*****

I strongly recommend Killexams.com practice tests as an excellent reference tool for those preparing for the exam. The website team carried out an excellent job, and I appreciate their performance and working style. The fast and concise answers provided were much less stressful to remember, and I managed to answer 98% of the questions, scoring 80% marks. The EC exam was a significant challenge for my IT profession, and I did not have much time to prepare. However, Killexams.com question and answer format effectively helped me overcome my fear, and I was able to answer 87 questions in 80 minutes.

Features of iPass4sure 312-49v10 Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

Premium PDF with 200 Q&A

Get Full Version

All EC-Council Exams

EC-Council Exams

Certification and Entry Test Exams

Complete exam list