Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CHFI 312-49v11 Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions
Questions # 51:

John, a system administrator at a growing e-commerce company, is tasked with configuring a RAID 5 array to support the company ' s increasing data storage needs. He needs to set up the array using three hard drives, ensuring that the data is both protected and accessible in the event of a drive failure. While configuring the array, John needs to understand how the RAID 5 system handles data redundancy and how parity data is distributed across the drives. How is the parity data stored and distributed in RAID 5?

Options:

A.

Parity data is stored on one drive, with no redundancy.


B.

Parity data is distributed across all drives in the array.


C.

Parity data is mirrored across two drives.


D.

Parity data is stored on a dedicated parity drive.


Expert Solution
Questions # 52:

During an investigation of anomalous CPU timing patterns on a compromised virtual machine hosted by a telecom provider, forensic analysts discover that the attacker launched a malicious VM on the same physical host as the target instance and extracted cryptographic keys by analyzing shared cache behavior. Which type of cloud computing attack does this technique represent?

Options:

A.

Side-Channel Attack


B.

Service Hijacking via Network Sniffing


C.

Service Hijacking via Social Engineering


D.

Wrapping Attack


Expert Solution
Questions # 53:

You are a cybersecurity analyst tasked with performing dynamic malware analysis on a suspicious file received by your organization. Your objective is to understand the behavior of the malware by running it in a controlled environment and monitoring its actions without allowing it to propagate to the production network. As a cybersecurity analyst conducting dynamic malware analysis, what is a key aspect of designing the testing environment to ensure the safety of the production network?

Options:

A.

Implementing host integrity monitoring to track system changes caused by the malware.


B.

Disabling antivirus software to prevent interference with the malware ' s execution.


C.

Running the malware on physical machines to minimize the risk of network propagation.


D.

Using outdated operating systems to reduce compatibility issues with the malware.


Expert Solution
Questions # 54:

During a malware investigation on a Linux server in Phoenix, investigators suspect that the malicious process is making frequent system calls to access protected resources. To analyze this behavior, they decide to trace and log the system calls made by the process. Which strace command provides a summary count of time, calls, and errors for each system call?

Options:

A.

strace -p


B.

strace -c ls > /dev/null


C.

strace -P ls /var/empty


D.

strace -o out.txt ./


Expert Solution
Questions # 55:

During an after-hours investigation at a healthcare provider in Phoenix, Arizona, analysts review Security log entries for group membership changes to trace who initiated the privilege expansion and which account was actually added. Focusing on the event description fields without altering the original .evtx, which field specifically identifies the account that was added or removed during the group change?

Options:

A.

Target Account Name


B.

Caller User Name


C.

First line of the description


D.

Member ID


Expert Solution
Questions # 56:

Taylor, a forensic expert, has been assigned to investigate a cyber-attack on an organizational host server. The server has been compromised, and during the investigation, Taylor is tasked with analyzing network traffic to identify the attack ' s point of entry. Using Wireshark, Taylor inspects a packet capture file and notices an unusual pattern of repeated login failure attempts over the FTP protocol. Based on these failed attempts, Taylor suspects a brute-force attack targeting the FTP service. Taylor ' s next step is to confirm whether the attacker was able to successfully log into the FTP server after these failures. To verify the success of the attack, Taylor needs to identify the specific response code from the FTP server that would indicate a successful login. Which of the following Wireshark filters will help Taylor confirm successful FTP login attempts?

Options:

A.

ftp.response.code == 530


B.

ftp.response.code == 213


C.

ftp.response.code == 230


D.

ftp.response.code == 550


Expert Solution
Questions # 57:

During a malware investigation at a financial institution in New York, forensic investigators executed a suspicious file on a Windows forensic workstation. Using the netstat -an command, they discovered that port 1177 had been opened and was actively connected. The investigators now need to determine whether the observed port activity is associated with legitimate services or indicative of malicious behavior. How should investigators evaluate the significance of this port activity?

Options:

A.

Review the list for any suspicious port number that is opened on the workstation


B.

Refer to online port databases


C.

Execute the suspect file on the forensic workstation


D.

Display all active TCP/IP connections along with a list of active ports using netstat -an


Expert Solution
Questions # 58:

During a federal investigation, a lawyer unintentionally discloses privileged information to a federal agency. The disclosure includes sensitive details related to a corporate client ' s ongoing legal dispute.

In the scenario described, what conditions must be met for the unintentional disclosure to extend the waiver of attorney-client privilege or work-product protection to undisclosed communications in both federal and state proceedings?

Options:

A.

The disclosed and undisclosed communications must concern different subject matters.


B.

The waiver must be unintentional.


C.

The disclosure must be accidental.


D.

The waiver must be intentional, and the disclosed and undisclosed communications must concern the same subject matter.


Expert Solution
Questions # 59:

A cyber attacker is suspected of using program packers as an anti forensics technique in a major data breach incident. As the lead cybersecurity investigator, you’ve been tasked to deal with the situation. Which of the following actions would be most effective in defeating this anti-forensic technique?

Options:

A.

Regularly update anti-virus software on all systems.


B.

Use unpacking tools to reverse the packing process and reveal the original code.


C.

Implement secure coding practices.


D.

Increase the frequency of network vulnerability scanning.


Expert Solution
Questions # 60:

Alex, a cybersecurity analyst in a tech firm, has intercepted a suspicious Word document that was sent to the company ' s CEO via email. Upon preliminary inspection, the document seems benign, but considering the firm ' s recent threats of cyberattacks, Alex decides to investigate further. He needs a tool that can help perform static analysis on the document to determine if there ' s any hidden malware. From the following options, which tool would be most effective for Alex ' s needs?

Options:

A.

FireEye ' s FLOSS


B.

PEStudio


C.

Olevba


D.

Cuckoo Sandbox


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 51-60 out of questions