Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions
Questions # 61:

Matthew has been assigned the task of analyzing a suspicious MS Office document via static analysis over an Ubuntu-based forensic machine. He wants to see what type of document It Is. whether It Is encrypted, or contains any flash objects/VBA macros. Which of the following python-based script should he run to get relevant information?

Options:

A.

oleform.py


B.

oleid.py


C.

oledir.py


D.

pdfid.py


Expert Solution
Questions # 62:

You are an information security analyst at a large pharmaceutical company. While performing a routine review of audit logs, you have noticed a significant amount of egress traffic to various IP addresses on destination port 22 during off-peak hours. You researched some of the IP addresses and found that many of them are in Eastern Europe. What is the most likely cause of this traffic?

Options:

A.

Malicious software on internal system is downloading research data from partner 5FTP servers in Eastern Europe


B.

Internal systems are downloading automatic Windows updates


C.

Data is being exfiltrated by an advanced persistent threat (APT)


D.

The organization's primary internal DNS server has been compromised and is performing DNS zone transfers to malicious external entities


Expert Solution
Questions # 63:

"In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to explain his/her actions and the impact of those actions on the evidence, in the court." Which ACPO principle states this?

Options:

A.

Principle 1


B.

Principle 3


C.

Principle 4


D.

Principle 2


Expert Solution
Questions # 64:

Which of the following tools will allow a forensic Investigator to acquire the memory dump of a suspect machine so that It may be Investigated on a forensic workstation to collect evidentiary data like processes and Tor browser artifacts?

Options:

A.

DB Browser SQLite


B.

Bulk Extractor


C.

Belkasoft Live RAM Capturer and AccessData FTK imager


D.

Hex Editor


Expert Solution
Questions # 65:

"No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court" - this principle Is advocated by which of the following?

Options:

A.

The Association of Chief Police Officers (ACPO) Principles of Digital Evidence


B.

Locard's exchange principle


C.

Scientific Working Group on Imaging Technology (SWGIT)


D.

FBI Cyber Division


Expert Solution
Questions # 66:

Jacob, a cybercrime investigator, joined a forensics team to participate in a criminal case involving digital evidence. After the investigator collected all the evidence and presents it to the court, the judge dropped the case and the defense attorney pressed charges against Jacob and the rest of the forensics team for unlawful search and seizure. What forensics privacy issue was not addressed prior to collecting the evidence?

Options:

A.

Compliance with the Second Amendment of the U.S. Constitution


B.

Compliance with the Third Amendment of the U.S. Constitution


C.

None of these


D.

Compliance with the Fourth Amendment of the U.S. Constitution


Expert Solution
Questions # 67:

What command-line tool enables forensic Investigator to establish communication between an Android device and a forensic workstation in order to perform data acquisition from the device?

Options:

A.

APK Analyzer


B.

SDK Manager


C.

Android Debug Bridge


D.

Xcode


Expert Solution
Questions # 68:

Web browsers can store relevant information from user activities. Forensic investigators may retrieve files, lists, access history, cookies, among other digital footprints. Which tool can contribute to this task?

Options:

A.

Most Recently Used (MRU) list


B.

MZCacheView


C.

Google Chrome Recovery Utility


D.

Task Manager


Expert Solution
Questions # 69:

Rule 1002 of Federal Rules of Evidence (US) talks about_____

Options:

A.

Admissibility of original


B.

Admissibility of duplicates


C.

Requirement of original


D.

Admissibility of other evidence of contents


Expert Solution
Questions # 70:

Cybercriminals sometimes use compromised computers to commit other crimes, which may involve using computers or networks to spread malware or Illegal Information. Which type of cybercrime stops users from using a device or network, or prevents a company from providing a software service to its customers?

Options:

A.

Denial-of-Service (DoS) attack


B.

Malware attack


C.

Ransomware attack


D.

Phishing


Expert Solution
Questions # 71:

During an Investigation, the first responders stored mobile devices In specific containers to provide network Isolation. All the following are examples of such pieces of equipment, except for:

Options:

A.

Wireless StrongHold bag


B.

VirtualBox


C.

Faraday bag


D.

RF shield box


Expert Solution
Questions # 72:

What happens lo the header of the file once It Is deleted from the Windows OS file systems?

Options:

A.

The OS replaces the first letter of a deleted file name with a hex byte code: E5h


B.

The OS replaces the entire hex byte coding of the file.


C.

The hex byte coding of the file remains the same, but the file location differs


D.

The OS replaces the second letter of a deleted file name with a hex byte code: Eh5


Expert Solution
Questions # 73:

Recently, an Internal web app that a government agency utilizes has become unresponsive, Betty, a network engineer for the government agency, has been tasked to determine the cause of the web application's unresponsiveness. Betty launches Wlreshark and begins capturing the traffic on the local network. While analyzing the results, Betty noticed that a syn flood attack was underway. How did Betty know a syn flood attack was occurring?

Options:

A.

Wireshark capture shows multiple ACK requests and SYN responses from single/multiple IP address(es)


B.

Wireshark capture does not show anything unusual and the issue is related to the web application


C.

Wireshark capture shows multiple SYN requests and RST responses from single/multiple IP address(es)


D.

Wireshark capture shows multiple SYN requests and ACK responses from single/multiple IP address(es)


Expert Solution
Questions # 74:

The working of the Tor browser is based on which of the following concepts?

Options:

A.

Both static and default routing


B.

Default routing


C.

Static routing


D.

Onion routing


Expert Solution
Questions # 75:

Which among the following acts has been passed by the U.S. Congress to protect investors from the possibility of fraudulent accounting activities by corporations?

Options:

A.

Federal Information Security Management act of 2002


B.

Gramm-Leach-Bliley act


C.

Health insurance Probability and Accountability act of 1996


D.

Sarbanes-Oxley act of 2002


Expert Solution
Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions