Eccouncil 312-49v9 practice test

Exam Title: Computer Hacking Forensic Investigator

Last update: Nov 27 ,2025
Question 1

An employee is attempting to wipe out data stored on a couple of compact discs (CDs) and digital
video discs (DVDs) by using a large magnet. You inform him that this method will not be effective in
wiping out the data because CDs and DVDs are ______________ media used to store large amounts
of data and are not affected by the magnet.

  • A. logical
  • B. anti-magnetic
  • C. magnetic
  • D. optical
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Lance wants to place a honeypot on his network. Which of the following would be your
recommendations?

  • A. Use a system that has a dynamic addressing on the network
  • B. Use a system that is not directly interacting with the router
  • C. Use it on a system in an external DMZ in front of the firewall
  • D. It doesn't matter as all replies are faked
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

What does the acronym POST mean as it relates to a PC?

  • A. Primary Operations Short Test
  • B. PowerOn Self Test
  • C. Pre Operational Situation Test
  • D. Primary Operating System Test
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

Which legal document allows law enforcement to search an office, place of business, or other locale
for evidence relating to an alleged crime?

  • A. bench warrant
  • B. wire tap
  • C. subpoena
  • D. search warrant
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

You are working as an investigator for a corporation and you have just received instructions from
your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation.
Your job is to complete the required evidence custody forms to properly document each piece of
evidence as it is collected by other members of your team. Your manager instructs you to complete
one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will
these forms be stored to help preserve the chain of custody of the case?

  • A. All forms should be placed in an approved secure container because they are now primary evidence in the case.
  • B. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.
  • C. The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.
  • D. All forms should be placed in the report file because they are now primary evidence in the case.
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

The MD5 program is used to:

  • A. wipe magnetic media before recycling it
  • B. make directories on an evidence disk
  • C. view graphics files on an evidence drive
  • D. verify that a disk is not altered when you examine it
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Which is a standard procedure to perform during all computer forensics investigations?

  • A. with the hard drive removed from the suspect PC, check the date and time in the system's CMOS
  • B. with the hard drive in the suspect PC, check the date and time in the File Allocation Table
  • C. with the hard drive removed from the suspect PC, check the date and time in the system's RAM
  • D. with the hard drive in the suspect PC, check the date and time in the system's CMOS
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

E-mail logs contain which of the following information to help you in your investigation? (Choose
four.)

  • A. user account that was used to send the account
  • B. attachments sent with the e-mail message
  • C. unique message identifier
  • D. contents of the e-mail message
  • E. date and time the message was sent
Answer:

A,C,D,E

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 9

In a forensic examination of hard drives for digital evidence, what type of user is most likely to have
the most file slack to analyze?

  • A. one who has NTFS 4 or 5 partitions
  • B. one who uses dynamic swap file capability
  • C. one who uses hard disk writes on IRQ 13 and 21
  • D. one who has lots of allocation units per block or cluster
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

In what way do the procedures for dealing with evidence in a criminal case differ from the
procedures for dealing with evidence in a civil case?

  • A. evidence must be handled in the same way regardless of the type of case
  • B. evidence procedures are not important unless you work for a law enforcement agency
  • C. evidence in a criminal case must be secured more tightly than in a civil case
  • D. evidence in a civil case must be secured more tightly than in a criminal case
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 58
Viewing questions 1-10 out of 589
Go To
page 2