Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 12 Topic 2 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 12 Topic 2 Discussion

312-49v11 Exam Topic 2 Question 12 Discussion:
Question #: 12
Topic #: 2

During an investigation, an examiner opens an Excel file with a .xlsm extension, indicating that the document is capable of containing malicious code. Upon closer inspection, the investigator must determine if the file poses a threat. What should the investigator focus on to identify potential risks?


A.

Check if any streams in the file are labeled as containing macros.


B.

Inspect the file to see if any external resources, such as links or network calls, are embedded in the document.


C.

Check the file size to determine if it is unusually large or small, as this might indicate hidden data.


D.

Inspect the metadata of the file for details about its author, creation date, and last modification.


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.