Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 312-49v11 Practice Exam with Questions & Answers | Set: 2

Questions 11

During a network security audit, an investigator is tasked with assessing the security of nearby wireless networks. The investigator needs to gather real-time information about nearby wireless access points (APs) and display this data using diagnostic views and charts. The tool should allow them to visualize details such as signal strength, AP names, and other relevant characteristics of the networks in the area. Which of the following tools would be most appropriate for this task?

Options:
A.

John the Ripper

B.

NetSurveyor

C.

Netcraft

D.

hashcat

ECCouncil 312-49v11 Premium Access
Questions 12

You are a cybersecurity analyst tasked with performing dynamic malware analysis on a suspicious file received by your organization. Your objective is to understand the behavior of the malware by running it in a controlled environment and monitoring its actions without allowing it to propagate to the production network. As a cybersecurity analyst conducting dynamic malware analysis, what is a key aspect of designing the testing environment to ensure the safety of the production network?

Options:
A.

Implementing host integrity monitoring to track system changes caused by the malware.

B.

Disabling antivirus software to prevent interference with the malware's execution.

C.

Running the malware on physical machines to minimize the risk of network propagation.

D.

Using outdated operating systems to reduce compatibility issues with the malware.

Questions 13

Following a cybercrime incident, a forensic investigator is conducting a detailed examination of a suspect’s digital device. The investigator needs to preserve and analyze the disk images without being restricted by various image file formats tied to commercial software, which may limit the investigator's ability to work with a range of analysis platforms. The investigator chooses a simple, straightforward, and uncompressed format that can be easily accessed and analyzed using a wide range of forensic tools and platforms, without the need for specialized software. Which data acquisition format should the investigator use in this case?

Options:
A.

Adopt the raw format that is commonly used in digital evidence investigations.

B.

Choose the AFF4 format, which offers advanced features for comprehensive analysis.

C.

Employ the advanced forensics format for storing metadata and disk images.

D.

Use a proprietary format that is compatible with specific commercial software.

Questions 14

During a forensic investigation of a compromised system, the investigator is analyzing various forensic artifacts to determine the nature and scope of the attack. The investigator is specifically looking for information related to failed sign-in attempts, security policy changes, alerts from intrusion detection systems, and unusual application malfunctions.

Which type of forensic artifact is most likely to contain this critical information?

Options:
A.

Cryptographic artifacts that store information about encryption and decryption operations.

B.

Browser artifacts that track user browsing history and website interactions.

C.

Process and memory artifacts that contain information about running processes and system memory.

D.

Log file anomalies that provide detailed records of events and errors on the device.

Questions 15

During a cybersecurity investigation involving a data breach at a financial institution, an investigator is tasked with identifying the root cause of the breach and generating a timeline of events that led to the incident. The investigator needs to determine which step in the forensic process will help uncover the sequence of activities, including the vulnerabilities exploited, the time of attack, and the specific actions taken by the attacker. Which of the following forensic techniques is most effective for achieving this goal?

Options:
A.

Data duplication

B.

Photographing the crime scene

C.

Data analysis

D.

Data acquisition

Questions 16

A digital forensic investigator is tasked with analyzing anNTFS image fileextracted from a pen drive. They leverageThe Sleuth Kit (TSK)for this task, specifically utilizing thefsstatcommand-line tool. By employing fsstat, they delve into the file system’s intricate details, such as metadata, inode numbers, and block or cluster information, thereby facilitating a comprehensive examination.

How can an investigator use TSK to analyze disk images?

Options:
A.

By performing network scans

B.

By conducting manual inspections

C.

By using the plug-in framework

D.

By writing custom code

Questions 17

During a forensic investigation of a compromised Windows system, Investigator Sarah is tasked with extracting artifacts related to the system'spagefile.sys. She needs to navigate through the registry to locate this specific information. Which of the following registry paths should Sarah examine to extract pagefile.sys artifacts from the system?

Options:
A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

B.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Windows

C.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName

D.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management

Questions 18

During a cybercrime investigation involving a large-scale data breach, the investigator uncovers that the evidence is distributed across several cloud-based platforms, with the data hosted on servers in multiple countries. Although the investigator has secured the necessary legal authorizations, including international warrants and data access approvals, they are encountering significant hurdles in retrieving the data due to the complexities of multi-jurisdictional cloud repositories. These issues are causing considerable delays, hindering the timely collection of critical evidence needed to identify the perpetrators.

What is the primary challenge the investigator is facing in this case?

Options:
A.

Limited legal understanding and inadequate technical knowledge of the laws involved across different cloud-based services and jurisdictions.

B.

Lack of forensic readiness in cloud environments, preventing evidence collection.

C.

Volatile nature of evidence, with crucial logs being lost or overwritten in cloud environments.

D.

Data storage in multiple jurisdictions, leading to issues in accessing evidence.

Questions 19

You, as a forensic investigator, have been assigned to investigate a case involving the suspect's email communication. During the investigation, you discover that the emails from the suspect's Trash folder may contain crucial evidence. The emails are stored in.pst files, and you must extract and analyze all relevant email messages, including those that were deleted or marked as corrupted. To ensure the integrity of the data, you need a tool that can efficiently process these files, recover any deleted messages, and provide a clear view of the email contents for analysis. Which of the following tools would be best suited for this task?

Options:
A.

P2LOCATION's Email Header Tracer

B.

Email Dossier

C.

Hunter's Email Verifier

D.

SysTools MailPro+

Questions 20

During a forensic investigation into a recent security incident within an organization, the investigator is tasked with documenting every action taken with the evidence to ensure proper chain of custody. The investigator carefully documents every action taken with the evidence in a logbook. The evidence is tagged with unique identifiers to prevent confusion. A detailed chain of custody record is also created to track the evidence's movement and handling throughout the investigation. Which investigation step is the investigator performing in this scenario?

Options:
A.

The investigator is preserving the evidence collected from the incident site.

B.

The investigator is performing scoping on the location where the security incident took place.

C.

The investigator is carrying out data analysis on the evidence for potential findings related to the breach.

D.

The investigator is conducting a search and seizure of the evidence related to the security incident.

Exam Code: 312-49v11
Certification Provider: ECCouncil
Exam Name: Computer Hacking Forensic Investigator (CHFIv11)
Last Update: Feb 21, 2026
Questions: 150