Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 6 out of 15 pages
Viewing questions 76-90 out of questions
Questions # 76:

To understand the impact of a malicious program after the booting process and to collect recent information from the disk partition, an Investigator should evaluate the content of the:

Options:

A.

MBR


B.

GRUB


C.

UEFI


D.

BIOS


Expert Solution
Questions # 77:

An investigator wants to extract passwords from SAM and System Files. Which tool can the Investigator use to obtain a list of users, passwords, and their hashes In this case?

Options:

A.

PWdump7


B.

HashKey


C.

Nuix


D.

FileMerlin


Expert Solution
Questions # 78:

This is a statement, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted. Which among the following is suitable for the above statement?

Options:

A.

Testimony by the accused


B.

Limited admissibility


C.

Hearsay rule


D.

Rule 1001


Expert Solution
Questions # 79:

Fill In the missing Master Boot Record component.

1. Master boot code

2. Partition table

3._______________

Options:

A.

Boot loader


B.

Signature word


C.

Volume boot record


D.

Disk signature


Expert Solution
Questions # 80:

Place the following In order of volatility from most volatile to the least volatile.

Options:

A.

Registers and cache, routing tables, temporary file systems, disk storage, archival media


B.

Register and cache, temporary file systems, routing tables, disk storage, archival media


C.

Registers and cache, routing tables, temporary file systems, archival media, disk storage


D.

Archival media, temporary file systems, disk storage, archival media, register and cache


Expert Solution
Questions # 81:

Which Federal Rule of Evidence speaks about the Hearsay exception where the availability of the declarant Is immaterial and certain characteristics of the declarant such as present sense Impression, excited utterance, and recorded recollection are also observed while giving their testimony?

Options:

A.

Rule 801


B.

Rule 802


C.

Rule 804


D.

Rule 803


Expert Solution
Questions # 82:

To which phase of the computer forensics investigation process does "planning and budgeting of a forensics lab" belong?

Options:

A.

Post-investigation phase


B.

Reporting phase


C.

Pre-investigation phase


D.

Investigation phase


Expert Solution
Questions # 83:

Assume there Is a file named myflle.txt In C: drive that contains hidden data streams. Which of the following commands would you Issue to display the contents of a data stream?

Options:

A.

echo text > program: source_file


B.

myfile.dat: st ream 1


C.

C:\MORE < myfile.txt:siream1


D.

C:\>ECHO text_message > myfile.txt:stream1


Expert Solution
Questions # 84:

Which of the following is a requirement for senders as per the CAN-SPAM act?

Options:

A.

Senders cannot use misleading or false header information


B.

Senders should never share their physical postal address in the email


C.

Senders must use deceptive subject lines


D.

Emails must not contain information regarding how to stop receiving emails from the sender in future


Expert Solution
Questions # 85:

A forensic examiner encounters a computer with a failed OS installation and the master boot record (MBR) or partition sector damaged. Which of the following tools can find and restore files and Information In the disk?

Options:

A.

Helix


B.

R-Studio


C.

NetCat


D.

Wireshark


Expert Solution
Questions # 86:

Which of the following directory contains the binary files or executables required for system maintenance and administrative tasks on a Linux system?

Options:

A.

/sbin


B.

/bin


C.

/usr


D.

/lib


Expert Solution
Questions # 87:

Which of the following methods of mobile device data acquisition captures all the data present on the device, as well as all deleted data and access to unallocated space?

Options:

A.

Manual acquisition


B.

Logical acquisition


C.

Direct acquisition


D.

Physical acquisition


Expert Solution
Questions # 88:

You are a forensic investigator who is analyzing a hard drive that was recently collected as evidence. You have been unsuccessful at locating any meaningful evidence within the file system and suspect a drive wiping utility may have been used. You have reviewed the keys within the software hive of the Windows registry and did not find any drive wiping utilities. How can you verify that drive wiping software was used on the hard drive?

Options:

A.

Document in your report that you suspect a drive wiping utility was used, but no evidence was found


B.

Check the list of installed programs


C.

Load various drive wiping utilities offline, and export previous run reports


D.

Look for distinct repeating patterns on the hard drive at the bit level


Expert Solution
Questions # 89:

An EC2 instance storing critical data of a company got infected with malware. The forensics team took the EBS volume snapshot of the affected Instance to perform further analysis and collected other data of evidentiary value. What should be their next step?

Options:

A.

They should pause the running instance


B.

They should keep the instance running as it stores critical data


C.

They should terminate all instances connected via the same VPC


D.

They should terminate the instance after taking necessary backup


Expert Solution
Questions # 90:

Which of the following malware targets Android mobile devices and installs a backdoor that remotely installs applications from an attacker-controlled server?

Options:

A.

Felix


B.

XcodeGhost


C.

xHelper


D.

Unflod


Expert Solution
Viewing page 6 out of 15 pages
Viewing questions 76-90 out of questions