Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CHFI 312-49v11 Questions and answers with CertsForce

Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions
Questions # 31:

As the senior forensic analyst for an international software development firm, you’re tasked with handling an ongoing investigation into suspected insider threats. Several project files have been reported as missing from the company’s secured servers. In one instance, a junior team member reported receiving an email, seemingly from his manager, instructing him to move specific files to a shared network location. After complying, the files disappeared. As part of your investigation, you have acquired disk images of all systems involved. What should be your next step?

Options:

A.

Perform an immediate analysis of the disk images, focusing on identifying and extracting any potential malware for analysis.


B.

Interview the team member who moved the files to determine if they had any role in the data loss.


C.

Prioritize the retrieval of deleted files from the disk images and scrutinize any software or processes that may have led to their deletion.


D.

Conduct a detailed analysis of the email headers and server logs to identify the origin of the deceptive email.


Expert Solution
Questions # 32:

During Dynamic Malware Analysis in a sandbox at a healthcare provider in Nashville, the sample shows no immediate network activity. After a controlled restart, the executable launches automatically at logon without user interaction. To capture the system changes responsible for this behavior across a reboot cycle, what area of system activity should investigators focus on monitoring?

Options:

A.

Monitoring processes


B.

Monitoring registry artifacts


C.

Monitoring services and startup programs


D.

Monitoring event logs


Expert Solution
Questions # 33:

In a privilege-escalation investigation at a healthcare technology firm in Texas, forensic analysts review Microsoft Azure logging sources to identify who changed administrative role assignments within the organization ' s identity-management environment. Which Azure log source should they examine to obtain this information?

Options:

A.

Azure Monitor Logs


B.

Azure Activity Logs


C.

Azure AD Sign-in Logs


D.

Azure AD Audit Logs


Expert Solution
Questions # 34:

A retail platform in Austin, Texas reports repeated bot traffic and injection attempts detected at its software-based gateway. As the incident team begins evidence collection, which step in the web-attack investigation methodology explicitly directs them to include output from that gateway as a primary evidence source?

Options:

A.

Trace attacking IP


B.

Collect WAF logs


C.

Encrypt checksum logs


D.

Forensic image acquisition and duplication


Expert Solution
Questions # 35:

Thomas, a cybersecurity analyst, is investigating a potential intrusion into a web server after receiving an alert for suspicious activity. Upon reviewing the IIS logs, he notices an unusually high number of requests coming from the same IP address within a short time period. These requests are spread across various times during the day and seem to target multiple resources on the server. Thomas suspects that the requests may be part of a larger attempt to scan for vulnerabilities or exploit a specific weakness. Which of the following log fields should Thomas focus on to better understand the nature of these requests?

Options:

A.

sc-status (Status code)


B.

cs-uri-stem (Requested URI)


C.

cs-ip (Client IP address)


D.

cs-user-agent (User-Agent string)


Expert Solution
Questions # 36:

A company experiences a major data breach within its cloud infrastructure after a critical failure on the part of its cloud service provider (CSP). The breach occurs because the CSP ' s infrastructure fails to adequately segregate and safeguard the data of different customers in a multi-tenant environment. The attacker exploits this weakness, gaining unauthorized access to sensitive data from multiple clients sharing the same cloud systems. As a result, customer data is revealed across several accounts, with the attacker using this access to move laterally through the system, escalating privileges, and accessing additional confidential information. The breach remained undetected for an extended period, allowing the attacker to cover their tracks and exfiltrate large volumes of data. What threat is most likely to be the cause of this issue?

Options:

A.

Failure in due diligence during the cloud service selection.


B.

Loss of client control over cloud infrastructure and data


C.

Lack of monitoring leading to unnoticed data breaches.


D.

Insufficient resource isolation causing cross-tenant data exposure.


Expert Solution
Questions # 37:

Investigators conduct forensic analysis to examine Tor Browser activity. They scrutinize memory dumps to extract email artifacts and analyze storage devices for email attachments, both with the Tor Browser open and closed. Additionally, they explore forensic options post-uninstallation of the Tor Browser to uncover any residual evidence.

What is the primary objective of forensic analysis in scenarios involving the Tor Browser?

Options:

A.

To analyze email attachments solely when the Tor Browser is closed


B.

To explore email artifacts and attachments with the Tor Browser in various states


C.

To examine email artifacts only when the Tor Browser is open


D.

To perform analysis post-uninstallation of the Tor Browser


Expert Solution
Questions # 38:

During an incident-response project at a biotech company in San Diego, California, the team must move 600 TB of research datasets from an isolated lab network to Google Cloud, but the site has limited bandwidth and no direct peering. They need a secure, offline method to ship the data to Google for upload into Cloud Storage. Which Google Cloud service fits this requirement?

Options:

A.

Data Transfer Services


B.

Transfer Appliance


C.

Cloud Storage for Firebase


D.

Google Cloud Backup and DR


Expert Solution
Questions # 39:

As a malware analyst, you ' re tasked with scrutinizing a suspicious program on a Windows workstation, particularly focusing on its interactions with system registry files. Monitoring registry artifacts provides insights into malware behavior, aiding in identifying persistence mechanisms and malicious activities. How do forensic investigators gain insights into malware behavior on Windows systems by monitoring registry artifacts?

Options:

A.

Monitoring network traffic patterns


B.

Reviewing browser history logs


C.

Tracking system file executions


D.

Analyzing registry key modifications


Expert Solution
Questions # 40:

As the system boots up, IT Technician Smith oversees the Macintosh boot process. After the completion of the BootROM operation, control transitions to the BootX (PowerPC) or boot.efi (Intel) boot loader, located in the /System/Library/CoreServices directory. Smith then awaits the next step in the sequence to ensure the system initializes seamlessly.

Which subsequent step in the Macintosh boot process follows in sequence?

Options:

A.

EFI initializes the hardware interfaces


B.

Boot loader loads a pre-linked version of the kernel


C.

System selects the OS


D.

Activation of BootROM


Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions