Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following is the most effective tool for acquiring volatile data from a Windows-based system?

Options:

A.

Coreography


B.

Datagrab


C.

Ethereal


D.

Helix


Expert Solution
Questions # 92:

This law sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.

Options:

A.

The CAN-SPAM act


B.

Federal Spam act


C.

Telemarketing act


D.

European Anti-Spam act


Expert Solution
Questions # 93:

Consider a scenario where the perpetrator of a dark web crime has unlnstalled Tor browser from their computer after committing the crime. The computer has been seized by law enforcement so they can Investigate It for artifacts of Tor browser usage. Which of the following should the Investigators examine to establish the use of Tor browser on the suspect machine?

Options:

A.

Swap files


B.

Files in Recycle Bin


C.

Security logs


D.

Prefetch files


Expert Solution
Questions # 94:

Cloud forensic investigations impose challenges related to multi-jurisdiction and multi-tenancy aspects. To have a better understanding of the roles and responsibilities between the cloud service provider (CSP) and the client, which document should the forensic investigator review?

Options:

A.

Service level agreement


B.

Service level management


C.

National and local regulation


D.

Key performance indicator


Expert Solution
Questions # 95:

Choose the layer in iOS architecture that provides frameworks for iOS app development?

Options:

A.

Media services


B.

Cocoa Touch


C.

Core services


D.

Core OS


Expert Solution
Questions # 96:

Before accessing digital evidence from victims, witnesses, or suspects, on their electronic devices, what should the Investigator do first to respect legal privacy requirements?

Options:

A.

Notify the fact to the local authority or employer


B.

Remove the battery or turn-off the device


C.

Protect the device against external communication


D.

Obtain formal written consent to search


Expert Solution
Questions # 97:

Identify the location of Recycle Bin on a Windows 7 machine that uses NTFS file system to store and retrieve files on the hard disk.

Options:

A.

Drive:\$Recycle.Bin


B.

DriveARECYCLER


C.

C:\RECYCLED


D.

DriveARECYCLED


Expert Solution
Questions # 98:

In a Fllesystem Hierarchy Standard (FHS), which of the following directories contains the binary files required for working?

Options:

A.

/sbin


B.

/proc


C.

/mm


D.

/media


Expert Solution
Questions # 99:

A call detail record (CDR) provides metadata about calls made over a phone service. From the following data fields, which one Is not contained in a CDR.

Options:

A.

The call duration


B.

A unique sequence number identifying the record


C.

The language of the call


D.

Phone number receiving the call


Expert Solution
Questions # 100:

A clothing company has recently deployed a website on Its latest product line to Increase Its conversion rate and base of customers. Andrew, the network administrator recently appointed by the company, has been assigned with the task of protecting the website from Intrusion and vulnerabilities. Which of the following tool should Andrew consider deploying in this scenario?

Options:

A.

ModSecurity


B.

CryptaPix


C.

Recuva


D.

Kon-Boot


Expert Solution
Questions # 101:

Which of the following Ii considered as the starting point of a database and stores user data and database objects in an MS SQL server?

Options:

A.

Ibdata1


B.

Application data files (ADF)


C.

Transaction log data files (LDF)


D.

Primary data files (MDF)


Expert Solution
Questions # 102:

An investigator Is examining a file to identify any potentially malicious content. To avoid code execution and still be able to uncover hidden indicators of compromise (IOC), which type of examination should the investigator perform:

Options:

A.

Threat hunting


B.

Threat analysis


C.

Static analysis


D.

Dynamic analysis


Expert Solution
Questions # 103:

In forensics.______are used lo view stored or deleted data from both files and disk sectors.

Options:

A.

Hash algorithms


B.

SI EM tools


C.

Host interfaces


D.

Hex editors


Expert Solution
Questions # 104:

Debbie has obtained a warrant to search a known pedophiles house. Debbie went to the house and executed the search warrant to seize digital devices that have been recorded as being used for downloading Illicit Images. She seized all digital devices except a digital camera. Why did she not collect the digital camera?

Options:

A.

The digital camera was not listed as one of the digital devices in the warrant


B.

The vehicle Debbie was using to transport the evidence was already full and could not carry more items


C.

Debbie overlooked the digital camera because it is not a computer system


D.

The digital camera was old. had a cracked screen, and did not have batteries. Therefore, it could not have been used in a crime.


Expert Solution
Questions # 105:

Storage location of Recycle Bin for NTFS file systems (Windows Vista and later) is located at:

Options:

A.

Drive:\$ Recycle. Bin


B.

DriveARECYClE.BIN


C.

Drive:\RECYCLER


D.

Drive:\REYCLED


Expert Solution
Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions