EC-Council 312-49v10 Exam (page: 9)
EC-Council Computer Hacking Forensic Investigator
Updated on: 25-Dec-2025

Viewing Page 9 of 138

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer?

  1. rootkit
  2. key escrow
  3. steganography
  4. Offset

Answer(s): C



During the course of an investigation, you locate evidence that may prove the innocence of the suspect of the investigation. You must maintain an unbiased opinion and be objective in your entire fact nding process. Therefore, you report this evidence. This type of evidence is known as:

  1. Inculpatory evidence
  2. Mandatory evidence
  3. Exculpatory evidence
  4. Terrible evidence

Answer(s): C



If you discover a criminal act while investigating a corporate policy abuse, it becomes a publicsector investigation and should be referred to law enforcement?

  1. true
  2. false

Answer(s): A



What binary coding is used most often for e-mail purposes?

  1. MIME
  2. Uuencode
  3. IMAP
  4. SMTP

Answer(s): A



If you see the les Zer0.tar.gz and copy.tar.gz on a Linux system while doing an investigation, what can you conclude?

  1. The system les have been copied by a remote attacker
  2. The system administrator has created an incremental backup
  3. The system has been compromised using a t0rnrootkit
  4. Nothing in particular as these can be operational les

Answer(s): D



Viewing Page 9 of 138



Share your comments for EC-Council 312-49v10 exam with other users:

Emmah 7/29/2023 9:59:00 AM

are these valid chfi questions
KENYA


Christopher 9/5/2022 10:54:00 PM

the new versoin of this exam which i downloaded has all the latest questions from the exam. i only saw 3 new questions in the exam which was not in this dump.
CANADA


Aloke Paul 9/11/2023 6:53:00 AM

is this valid for chfiv9 as well... as i am reker 3rd time...
CHINA