EC-Council 312-49v10 Exam (page: 24)
EC-Council Computer Hacking Forensic Investigator
Updated on: 09-Feb-2026

Viewing Page 24 of 138

O ce Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identi er of the machine that created the document.
What is that code called?

  1. Globally unique ID
  2. Microsoft Virtual Machine Identi er
  3. Personal Application Protocol
  4. Individual ASCII string

Answer(s): A



You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case.
How would you permanently erase the data on the hard disk?

  1. Throw the hard disk into the re
  2. Run the powerful magnets over the hard disk
  3. Format the hard disk multiple times using a low level disk utility
  4. Overwrite the contents of the hard disk with Junk data

Answer(s): A



You have been asked to investigate after a user has reported a threatening e-mail they have received from an external source. Which of the following are you most interested in when trying to trace the source of the message?

  1. The X509 Address
  2. The SMTP reply Address
  3. The E-mail Header
  4. The Host Domain Name

Answer(s): C



You are working as a Computer forensics investigator for a corporation on a computer abuse case. You discover evidence that shows the subject of your investigation is also embezzling money from the company. The company CEO and the corporate legal counsel advise you to contact law enforcement and provide them with the evidence that you have found. The law enforcement o cer that responds requests that you put a network sniffer on your network and monitor all tra c to the subject's computer. You inform the o cer that you will not be able to comply with that request because doing so would:

  1. Violate your contract
  2. Cause network congestion
  3. Make you an agent of law enforcement
  4. Write information to the subject's hard drive

Answer(s): C



A law enforcement o cer may only search for and seize criminal evidence with _______________________, which are facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed, evidence of the speci c crime exists and the evidence of the speci c crime exists at the place to be searched.

  1. Mere Suspicion
  2. A preponderance of the evidence
  3. Probable cause
  4. Beyond a reasonable doubt

Answer(s): C



Viewing Page 24 of 138



Share your comments for EC-Council 312-49v10 exam with other users:

Emmah 7/29/2023 9:59:00 AM

are these valid chfi questions
KENYA


Christopher 9/5/2022 10:54:00 PM

the new versoin of this exam which i downloaded has all the latest questions from the exam. i only saw 3 new questions in the exam which was not in this dump.
CANADA


Aloke Paul 9/11/2023 6:53:00 AM

is this valid for chfiv9 as well... as i am reker 3rd time...
CHINA