EC-Council 312-49v11 Exam (page: 3)
EC-Council Computer Hacking Forensic Investigator
Updated on: 24-Mar-2026

Viewing Page 3 of 20

Amber, a black hat hacker, has embedded a malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites.
What is she doing?

  1. Click-jacking
  2. Compromising a legitimate site
  3. Spearphishing
  4. Malvertising

Answer(s): D



Netstat is a tool for collecting information regarding network connections. It provides a simple view of TCP and

UDP connections, and their state and network traffic statistics.
Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?

  1. netstat ­ r
  2. netstat ­ ano
  3. netstat ­ b
  4. netstat ­ s

Answer(s): B



Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop.
Which of the following email clients can he use to analyze the DBX files?

  1. Microsoft Outlook
  2. Eudora
  3. Mozilla Thunderbird
  4. Microsoft Outlook Express

Answer(s): D



To which phase of the Computer Forensics Investigation Process does the Planning and Budgeting of a Forensics Lab belong?

  1. Post-investigation Phase
  2. Reporting Phase
  3. Pre-investigation Phase
  4. Investigation Phase

Answer(s): C



Identify the file system that uses $BitMap file to keep track of all used and unused clusters on a volume.

  1. NTFS
  2. FAT
  3. EXT
  4. FAT32

Answer(s): A



Which of the following Android libraries are used to render 2D (SGL) or 3D (OpenGL/ES) graphics content to the screen?

  1. OpenGL/ES and SGL
  2. Surface Manager
  3. Media framework
  4. WebKit

Answer(s): A



You are assigned a task to examine the log files pertaining to MyISAM storage engine.
While examining, you are asked to perform a recovery operation on a MyISAM log file.
Which among the following MySQL Utilities allow you to do so?

  1. mysqldump
  2. myisamaccess
  3. myisamlog
  4. myisamchk

Answer(s): C



Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.

  1. DevScan
  2. Devcon
  3. fsutil
  4. Reg.exe

Answer(s): B



Viewing Page 3 of 20



Share your comments for EC-Council 312-49v11 exam with other users:

Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA