EC-Council CHFI (312-49) Sample Questions

Start your Preparation for EC-Council 312-49 and become EC-Council Computer Hacking Forensic Investigator certified with edusum.com. Here you get online practice tests prepared and approved by EC-Council certified experts based on their own certification exam experience. Here, you also get detailed and regularly updated syllabus for EC-Council 312-49.

Katy Morgan
Created by Katy Morgan (User Generated Content*)User Generated Content is not posted by anyone affiliated with, or on behalf of, Playbuzz.com.
On Apr 18, 2018
1 / 5

yslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___________to transfer log messages in a clear text format.

2 / 5

What is the First Step required in preparing a computer for forensics investigation?

3 / 5

A forensic investigator is a person who handles the complete Investigation process, that is, the preservation, identification, extraction, and documentation of the evidence. The investigator has many roles and responsibilities relating to the cybercrime analysis. The role of the forensic investigator is to:

4 / 5

File deletion is a way of removing a file from a computer's file system. What happens when a file is deleted in windows 7?

5 / 5

BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?

5
Questions left
These are 10 of the World CRAZIEST Ice Cream Flavors
Created by Tal Garner
On Nov 18, 2021