| Exam Code/Number: | 312-49v10Join the discussion |
| Exam Name: | Computer Hacking Forensic Investigator (CHFI-v10) |
| Certification: | EC-COUNCIL |
| Question Number: | 706 |
| Publish Date: | Dec 14, 2025 |
|
Rating
100%
|
|
As a part of the investigation, Caroline, a forensic expert, was assigned the task to examine the transaction logs pertaining to a database named Transfers. She used SQL Server Management Studio to collect the active transaction log files of the database. Caroline wants to extract detailed information on the logs, including AllocUnitId, page id, slot id, etc. Which of the following commands does she need to execute in order to extract the desired information?
You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data.
What method would be most efficient for you to acquire digital evidence from this network?
You are running known exploits against your network to test for possible vulnerabilities. To test the strength of your virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test the software by using virus code where the code rewrites itself entirely and the signatures change from child to child, but the functionality stays the same. What type of virus is this that you are testing?
In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?
Which ISO Standard enables laboratories to demonstrate that they comply with quality assurance and provide valid results?
EC-COUNCIL.312-49v10.v2024-04-07.q105
Apr 07, 2024
EC-COUNCIL.312-49v10.v2022-07-31.q134
Jul 31, 2022
EC-COUNCIL.312-49v10.v2022-03-05.q104
Mar 05, 2022