New Certified Hacking Forensic Investigator (CHFI) Exam 312-49v10 Study Guide

New Certified Hacking Forensic Investigator (CHFI) Exam 312-49v10 Study Guide

Certified Hacking Forensic Investigator (CHFI) issued by EC-Council is a great certification, which is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. It is highly recommended to register EC-Council CHFI V10 312-49v10 exam and get new EC-Council CHFI certification exam 312-49v10 study guide as your learning materials. 312-49v10 study guide containing 601 practice exam questions and answers help candidates read the Q&As to learn all the exam contents to passs 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) certification exam successfully. In one word, new 312-49v10 study guide from ITExamShop will help you a whole lot in scoring excellent score in the Computer Hacking Forensic Investigator (CHFI-v10) actual exam.

Check Demo OF EC-Council CHFI 312-49v10 Study Guide By Reading The Following 312-49v10 Free Questions

Page 1 of 4

1. You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour .

Why were these passwords cracked so Quickly?

2. Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory. He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information .

Why will this not be viable?

3. E-mail logs contain which of the following information to help you in your investigation? (Choose four.)

4. If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

5. Office documents (Word, Excel, PowerPoint) contain a code that allows tracking the MAC, or unique identifier, of the machine that created the document .

What is that code called?

6. This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.

7. Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test.

The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable .

What kind of results did Jim receive from his vulnerability analysis?

8. ____________________ is simply the application of Computer Investigation and analysis techniques in the interests of determining potential legal evidence.

9. What is the name of the Standard Linux Command that is also available as windows application that can be used to create bit-stream images?

10. Bob has been trying to penetrate a remote production system for the past two weeks. This time however, he is able to get into the system. He was able to use the System for a period of three weeks. However, law enforcement agencies were recoding his every activity and this was later presented as evidence.

The organization had used a Virtual Environment to trap Bob .

What is a Virtual Environment?