New Year Special 75% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 75brite

ECCouncil Updated 312-49v10 Exam Questions and Answers by philippa

Page: 15 / 26

ECCouncil 312-49v10 Exam Overview :

Exam Name: Computer Hacking Forensic Investigator (CHFI-v10)
Exam Code: 312-49v10 Dumps
Vendor: ECCouncil Certification: CHFI v10
Questions: 704 Q&A's Shared By: philippa
Question 60

Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and hopefully solve the case. She is using a lookup table used for recovering a plain text password from cipher text; it contains word list and brute-force list along with their computed hash values. Chloe Is also using a graphical generator that supports SHA1.

a. What password technique is being used?

b. What tool is Chloe using?

Options:

A.

Dictionary attack b. Cisco PIX

B.

Cain & Able b. Rten

C.

Brute-force b. MScache

D.

Rainbow Tables b. Winrtgen

Discussion
Question 61

Which of the following applications will allow a forensic investigator to track the user login sessions and user transactions that have occurred on an MS SQL Server?

Options:

A.

ApexSQL Audit

B.

netcat

C.

Notepad++

D.

Event Log Explorer

Discussion
Cody
I used Cramkey Dumps to prepare and a lot of the questions on the exam were exactly what I found in their study materials.
Eric Dec 2, 2025
Really? That's great to hear! I used Cramkey Dumps too and I had the same experience. The questions were almost identical.
Freddy
I passed my exam with flying colors and I'm confident who will try it surely ace the exam.
Aleksander Dec 6, 2025
Thanks for the recommendation! I'll check it out.
Anaya
I found so many of the same questions on the real exam that I had already seen in the Cramkey Dumps. Thank you so much for making exam so easy for me. I passed it successfully!!!
Nina Dec 25, 2025
It's true! I felt so much more confident going into the exam because I had already seen and understood the questions.
Amy
I passed my exam and found your dumps 100% relevant to the actual exam.
Lacey Dec 19, 2025
Yeah, definitely. I experienced the same.
Question 62

You are the incident response manager at a regional bank. While performing routine auditing of web application logs, you find several attempted login submissions that contain the following strings:

Questions 62

What kind of attack has occurred?

Options:

A.

SQL injection

B.

Buffer overflow

C.

Cross-size scripting

D.

Cross-size request forgery

Discussion
Question 63

What happens lo the header of the file once It Is deleted from the Windows OS file systems?

Options:

A.

The OS replaces the first letter of a deleted file name with a hex byte code: E5h

B.

The OS replaces the entire hex byte coding of the file.

C.

The hex byte coding of the file remains the same, but the file location differs

D.

The OS replaces the second letter of a deleted file name with a hex byte code: Eh5

Discussion
Page: 15 / 26
Title
Questions
Posted

312-49v10
PDF

$26.25  $104.99

312-49v10 Testing Engine

$31.25  $124.99

312-49v10 PDF + Testing Engine

$41.25  $164.99