Exam Code: 312-49
Exam Questions: 705
Computer Hacking Forensic Investigator
Updated: 25 Nov, 2025
Viewing Page : 1 - 71
Practicing : 1 - 5 of 705 Questions
Question 1

Which of the following is a database in which information about every file and directory on an NT File
System (NTFS) volume is stored?

Options :
Answer: D

Question 2

Jacob is a computer forensics investigator with over 10 years of experience in investigations and has written
over 50 articles on computer forensics. He has been called upon as a qualified witness to testify the accuracy
and integrity of the technical log files gathered in an investigation into computer fraud. What is the term used
for Jacob’s testimony in this case?

Options :
Answer: D

Question 3

When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.

Options :
Answer: B

Question 4

You have compromised a lower-level administrator account on an Active Directory network of a small
company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the
Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?

Options :
Answer: D

Question 5

An executive has leaked the company trade secrets through an external drive. What process should the
investigation team take if they could retrieve his system?

Options :
Answer: A

Viewing Page : 1 - 71
Practicing : 1 - 5 of 705 Questions

© Copyrights FreePDFQuestions 2025. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.