Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions
Questions # 46:

An investigator has found certain details after analysis of a mobile device. What can reveal the manufacturer information?

Options:

A.

Equipment Identity Register (EIR)


B.

Electronic Serial Number (ESN)


C.

International mobile subscriber identity (IMSI)


D.

Integrated circuit card identifier (ICCID)


Expert Solution
Questions # 47:

Chong-lee, a forensics executive, suspects that a malware is continuously making copies of files and folders on a victim system to consume the available disk space. What type of test would confirm his claim?

Options:

A.

File fingerprinting


B.

Identifying file obfuscation


C.

Static analysis


D.

Dynamic analysis


Expert Solution
Questions # 48:

Gary is checking for the devices connected to USB ports of a suspect system during an investigation. Select the appropriate tool that will help him document all the connected devices.

Options:

A.

DevScan


B.

Devcon


C.

fsutil


D.

Reg.exe


Expert Solution
Questions # 49:

What does Locard's Exchange Principle state?

Options:

A.

Any information of probative value that is either stored or transmitted in a digital form


B.

Digital evidence must have some characteristics to be disclosed in the court of law


C.

Anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave


D.

Forensic investigators face many challenges during forensics investigation of a digital crime, such as extracting, preserving, and analyzing the digital evidence


Expert Solution
Questions # 50:

What is the framework used for application development for iOS-based mobile devices?

Options:

A.

Cocoa Touch


B.

Dalvik


C.

Zygote


D.

AirPlay


Expert Solution
Questions # 51:

Which of the following is NOT an anti-forensics technique?

Options:

A.

Data Deduplication


B.

Password Protection


C.

Encryption


D.

Steganography


Expert Solution
Questions # 52:

Robert, a cloud architect, received a huge bill from the cloud service provider, which usually doesn't happen. After analyzing the bill, he found that the cloud resource consumption was very high. He then examined the cloud server and discovered that a malicious code was running on the server, which was generating huge but harmless traffic from the server. This means that the server has been compromised by an attacker with the sole intention to hurt the cloud customer financially. Which attack is described in the above scenario?

Options:

A.

XSS Attack


B.

DDoS Attack (Distributed Denial of Service)


C.

Man-in-the-cloud Attack


D.

EDoS Attack (Economic Denial of Service)


Expert Solution
Questions # 53:

Which of the following statements is true regarding SMTP Server?

Options:

A.

SMTP Server breaks the recipient’s address into Recipient’s name and his/her designation before passing it to the DNS Server


B.

SMTP Server breaks the recipient's address into Recipient’s name and recipient’s address before passing it to the DNS Server


C.

SMTP Server breaks the recipient’s address into Recipient’s name and domain name before passing it to the DNS Server


D.

SMTP Server breaks the recipient’s address into Recipient’s name and his/her initial before passing it to the DNS Server


Expert Solution
Questions # 54:

Which of the following tools is used to dump the memory of a running process, either immediately or when an error condition occurs?

Options:

A.

FATKit


B.

Coreography


C.

Belkasoft Live RAM Capturer


D.

Cachelnf


Expert Solution
Questions # 55:

Which following forensic tool allows investigator to detect and extract hidden streams on NTFS drive?

Options:

A.

Stream Detector


B.

TimeStomp


C.

Autopsy


D.

analyzeMFT


Expert Solution
Questions # 56:

For the purpose of preserving the evidentiary chain of custody, which of the following labels is not appropriate?

Options:

A.

Relevant circumstances surrounding the collection


B.

General description of the evidence


C.

Exact location the evidence was collected from


D.

SSN of the person collecting the evidence


Expert Solution
Questions # 57:

In Java, when multiple applications are launched, multiple Dalvik Virtual Machine instances occur that consume memory and time. To avoid that. Android Implements a process that enables low memory consumption and quick start-up time. What is the process called?

Options:

A.

init


B.

Media server


C.

Zygote


D.

Daemon


Expert Solution
Questions # 58:

Data density of a disk drive is calculated by using_______

Options:

A.

Slack space, bit density, and slack density.


B.

Track space, bit area, and slack space.


C.

Track density, areal density, and slack density.


D.

Track density, areal density, and bit density.


Expert Solution
Questions # 59:

Simona has written a regular expression for the detection of web application-specific attack attempt that reads as /((\%3C)|)/lx. Which of the following does the part (|\%3E)|>) look for?

Options:

A.

Alphanumeric string or its hex equivalent


B.

Opening angle bracket or its hex equivalent


C.

Closing angle bracket or its hex equivalent


D.

Forward slash for a closing tag or its hex equivalent


Expert Solution
Questions # 60:

Which set of anti-forensic tools/techniques allows a program to compress and/or encrypt an executable file to hide attack tools from being detected by reverse-engineering or scanning?

Options:

A.

Packers


B.

Emulators


C.

Password crackers


D.

Botnets


Expert Solution
Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions