Questions for the 312-49 were updated on : Dec 06 ,2025
You are the incident response manager at a regional bank. While performing routine auditing of web
application logs, you find several attempted login submissions that contain the following strings:
What kind of attack has occurred?
C
Before accessing digital evidence from victims, witnesses, or suspects, on their electronic devices,
what should the Investigator do first to respect legal privacy requirements?
A
Which of the following is a requirement for senders as per the CAN-SPAM act?
A
Robert needs to copy an OS disk snapshot of a compromised VM to a storage account in different
region for further investigation. Which of the following should he use in this scenario?
A
Which layer in the loT architecture is comprised of hardware parts such as sensors, RFID tags, and
devices that play an important role in data collection?
B
Which of the following applications will allow a forensic investigator to track the user login sessions
and user transactions that have occurred on an MS SQL Server?
A
Jacob, a cybercrime investigator, joined a forensics team to participate in a criminal case involving
digital evidence. After the investigator collected all the evidence and presents it to the court, the
judge dropped the case and the defense attorney pressed charges against Jacob and the rest of the
forensics team for unlawful search and seizure. What forensics privacy issue was not addressed prior
to collecting the evidence?
D
Chloe is a forensic examiner who is currently cracking hashed passwords for a crucial mission and
hopefully solve the case. She is using a lookup table used for recovering a plain text password from
cipher text; it contains word list and brute-force list along with their computed hash values. Chloe Is
also using a graphical generator that supports SHA1.
a. What password technique is being used?
b. What tool is Chloe using?
D
In which loT attack does the attacker use multiple forged identities to create a strong illusion of traffic
congestion, affecting communication between neighboring nodes and networks?
D
Which of the following malware targets Android mobile devices and installs a backdoor that remotely
installs applications from an attacker-controlled server?
D
You are a forensic investigator who is analyzing a hard drive that was recently collected as evidence.
You have been unsuccessful at locating any meaningful evidence within the file system and suspect a
drive wiping utility may have been used. You have reviewed the keys within the software hive of the
Windows registry and did not find any drive wiping utilities. How can you verify that drive wiping
software was used on the hard drive?
D
Which of the following Windows event logs record events related to device drives and hardware
changes?
B
An investigator seized a notebook device installed with a Microsoft Windows OS. Which type of files
would support an investigation of the data size and structure in the device?
D
According to RFC 3227, which of the following is considered as the most volatile item on a typical
system?
A
Steve received a mail that seemed to have come from her bank. The mail has instructions for Steve
to click on a link and provide information to avoid the suspension of her account. The link in the mail
redirected her to a form asking for details such as name, phone number, date of birth, credit card
number or PIN, CW code, SNNs, and email address. On a closer look, Steve realized that the URL of
the form in not the same as that of her bank's. Identify the type of external attack performed by the
attacker In the above scenario?
A