Exam Code: 312-49
Exam Questions: 705
Computer Hacking Forensic Investigator
Updated: 21 Feb, 2026
Viewing Page : 1 - 71
Practicing : 1 - 5 of 705 Questions
Question 1

When marking evidence that has been collected with the aa/ddmmyy/nnnn/zz format, what does the nnn denote? 

Options :
Answer: D

Question 2

If the partition size is 4 GB, each cluster will be 32 K. Even if a file needs only 10 K, the entire 32 K will be allocated, resulting in 22 K of ________. 

Options :
Answer: A

Question 3

When operating systems mark a cluster as used but not allocated, the cluster is considered as _________

Options :
Answer: C

Question 4

Consider a scenario where a forensic investigator is performing malware analysis on a memory dump acquired from a victims computer. The investigator uses Volatility Framework to analyze RAM contents; which plugin helps investigator to identify hidden processes or injected code/DLL in the memory dump?

Options :
Answer: D

Question 5

A breach resulted from a malware attack that evaded detection and compromised the machine memory without installing any software or accessing the hard drive. What technique did the adversaries use to deliver the attack?

Options :
Answer: A

Viewing Page : 1 - 71
Practicing : 1 - 5 of 705 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.