Exam Code: 312-49
Exam Questions: 705
Computer Hacking Forensic Investigator
Updated: 06 Jan, 2026
Viewing Page : 1 - 71
Practicing : 1 - 5 of 705 Questions
Question 1

When conducting computer forensic analysis, you must guard against ______________ So that you remain focused on the primary job and insure that the level of work does not increase beyond what was originally expected.

Options :
Answer: B

Question 2

A breach resulted from a malware attack that evaded detection and compromised the machine memory without installing any software or accessing the hard drive. What technique did the adversaries use to deliver the attack?

Options :
Answer: A

Question 3

Which of the following tools is used to dump the memory of a running process, either immediately or when an error condition occurs?

Options :
Answer: C

Question 4

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement
he signed with the client, Harold is performing research online and seeing how much exposure the site has
received so far. Harold navigates to google.com and types in the following search. link:www.ghttech.net What
will this search produce?

Options :
Answer: B

Question 5

A forensics investigator is searching the hard drive of a computer for files that were recently moved to the
Recycle Bin. He searches for files in C:\RECYCLED using a command line tool but does not find anything.
What is the reason for this?

Options :
Answer: C

Viewing Page : 1 - 71
Practicing : 1 - 5 of 705 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.