Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 2 out of 15 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which of the following commands shows you the username and IP address used to access the system via a remote login session and the type of client from which they are accessing the system?

Options:

A.

Net config


B.

Net sessions


C.

Net share


D.

Net stat


Expert Solution
Questions # 17:

You are working as an independent computer forensics investigator and received a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a “simple backup copy” of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a “simple backup copy” will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceeding?

Options:

A.

Robust copy


B.

Incremental backup copy


C.

Bit-stream copy


D.

Full backup copy


Expert Solution
Questions # 18:

What must an attorney do first before you are called to testify as an expert?

Options:

A.

Qualify you as an expert witness


B.

Read your curriculum vitae to the jury


C.

Engage in damage control


D.

Prove that the tools you used to conduct your examination are perfect


Expert Solution
Questions # 19:

Which of the following is a MAC-based File Recovery Tool?

Options:

A.

VirtualLab


B.

GetDataBack


C.

Cisdem DataRecovery 3


D.

Smart Undeleter


Expert Solution
Questions # 20:

Which of the following Perl scripts will help an investigator to access the executable image of a process?

Options:

A.

Lspd.pl


B.

Lpsi.pl


C.

Lspm.pl


D.

Lspi.pl


Expert Solution
Questions # 21:

What technique is used by JPEGs for compression?

Options:

A.

TIFF-8


B.

ZIP


C.

DCT


D.

TCD


Expert Solution
Questions # 22:

Which Linux command when executed displays kernel ring buffers or information about device drivers loaded into the kernel?

Options:

A.

pgrep


B.

dmesg


C.

fsck


D.

grep


Expert Solution
Questions # 23:

Which of the following techniques delete the files permanently?

Options:

A.

Steganography


B.

Artifact Wiping


C.

Data Hiding


D.

Trail obfuscation


Expert Solution
Questions # 24:

Adam, a forensic analyst, is preparing VMs for analyzing a malware. Which of the following is NOT a best practice?

Options:

A.

Isolating the host device


B.

Installing malware analysis tools


C.

Using network simulation tools


D.

Enabling shared folders


Expert Solution
Questions # 25:

Which of the following tools is not a data acquisition hardware tool?

Options:

A.

UltraKit


B.

Atola Insight Forensic


C.

F-Response Imager


D.

Triage-Responder


Expert Solution
Questions # 26:

Where should the investigator look for the Edge browser’s browsing records, including history, cache, and cookies?

Options:

A.

ESE Database


B.

Virtual Memory


C.

Sparse files


D.

Slack Space


Expert Solution
Questions # 27:

Which command line tool is used to determine active network connections?

Options:

A.

netsh


B.

nbstat


C.

nslookup


D.

netstat


Expert Solution
Questions # 28:

Which principle states that “anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave”?

Options:

A.

Locard's Exchange Principle


B.

Enterprise Theory of Investigation


C.

Locard's Evidence Principle


D.

Evidence Theory of Investigation


Expert Solution
Questions # 29:

Which of the following files store the MySQL database data permanently, including the data that had been deleted, helping the forensic investigator in examining the case and finding the culprit?

Options:

A.

mysql-bin


B.

mysql-log


C.

iblog


D.

ibdata1


Expert Solution
Questions # 30:

Graphics Interchange Format (GIF) is a ____ RGB bitmap image format for images with up to 256 distinct colors per frame.

Options:

A.

8-bit


B.

32-bit


C.

16-bit


D.

24-bit


Expert Solution
Viewing page 2 out of 15 pages
Viewing questions 16-30 out of questions