Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CHFI 312-49v11 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions
Questions # 81:

Following a data breach, suspicion falls on an employee who had access to sensitive information. Insider threat tools are deployed to scrutinize the employee ' s digital activities and flag any anomalous behavior, aiding both the investigation and the prevention of future breaches.

How do insider threat tools contribute to cybersecurity in the given scenario?

Options:

A.

By monitoring and detecting suspicious behavior within the organization


B.

By analyzing competitor strategies


C.

By predicting market trends


D.

By enhancing social media presence


Expert Solution
Questions # 82:

Rachel, a forensic investigator, is examining a network-attached storage (NAS) device to recover files from a shared storage system used by a company. She needs to understand how files are being accessed and shared across different users. Which of the following file-sharing protocols should Rachel examine to understand how the files are accessed in this environment?

Options:

A.

SMTP


B.

iSCSI


C.

RAID


D.

SMB/CIFS


Expert Solution
Questions # 83:

During a corporate fraud investigation in Austin, Texas, examiners find that files were erased, logs altered, timestamps manipulated, and content hidden in ways that reduce the quantity and quality of recoverable digital evidence. Which term best describes this class of actions used by perpetrators during cybercrimes?

Options:

A.

Brute-force Techniques


B.

Anti-forensics Techniques


C.

Disk Degaussing Techniques


D.

Bypassing Techniques


Expert Solution
Questions # 84:

During a malware analysis investigation, a suspicious Microsoft Office document is identified as a potential threat. The document contains embedded macros and triggers unusual behavior when opened. In digital forensics, what is the primary purpose of analyzing suspicious Microsoft Office documents?

Options:

A.

To determine the author ' s identity


B.

To optimize the formatting and layout of the document


C.

To identify potential malware or malicious code embedded within the document


D.

To improve the performance of Microsoft Office applications


Expert Solution
Questions # 85:

Sophia, a forensic analyst, is examining the event log files on a compromised server. During her investigation, she identifies an entry in the event log header that seems unusual. The entry ' s ELF_LOGFILE_HEADER value indicates that records have been written to the log, but the event log file has not been properly closed. Based on this information, which ELF_LOGFILE_HEADER value would Sophia identify?

Options:

A.

ELF_LOGFILE_HEADER_DIRTY 0x0001


B.

ELF_LOGFILE_HEADER_ARCHIVE_SET 0x0008


C.

ELF_LOGFILE_HEADER_WRAP 0x0002


D.

ELF_LOGFILE_LOGFULL_WRITTEN 0x0004


Expert Solution
Questions # 86:

During an investigation into unauthorized account activity at a healthcare provider in Boston, forensic analysts parse raw event log files to identify when suspicious activity occurred. They notice the event record contains different timestamp fields. One reflects when the event was originally generated by the source application, while the other reflects when the event was actually written into the log. Which EventLogRecord field indicates the time the event was generated?

Options:

A.

DataOffset


B.

TimeWritten


C.

TimeGenerated


D.

UserSidOffset


Expert Solution
Questions # 87:

Your team has identified unusual traffic patterns from a server in the corporate network. Upon investigation, you find multiple established connections to unfamiliar foreign IP addresses. After capturing the network traffic for analysis, you notice that the traffic content seems random and does not correspond to any known protocol. What might this suggest?

Options:

A.

The server is part of a botnet.


B.

The server is communicating with a Command and Control server.


C.

The server is infected with ransomware.


D.

The server is under a DDoS attack.


Expert Solution
Questions # 88:

In the aftermath of a sophisticated cyber-attack on a financial institution, forensic investigators are tasked with retrieving critical evidence from a compromised server. However, upon examination, they encounter encrypted files and password-protected directories, indicating attempts to thwart forensic analysis through password protection.

To counter these anti-forensic measures effectively, which of the following strategies would be most effective?

Options:

A.

Conducting a brute-force attack to systematically guess the passwords of encrypted files and protected directories.


B.

Utilizing a dictionary attack to systematically test common passwords against encrypted files and directories.


C.

Deploying a targeted phishing campaign to obtain passwords or encryption keys safeguarding files and directories.


D.

Utilizing rainbow tables to expedite the decryption process and bypass password protection mechanisms.


Expert Solution
Questions # 89:

In a large-scale healthcare breach in Boston, forensic investigators must archive several terabytes of compromised patient records for long-term evidence preservation. Since the data will be written once as forensic images and accessed infrequently, analysts require the storage technology that offers maximum capacity at lower cost, even if endurance and performance are reduced. What type of NAND flash memory in the seized SSD best meets this forensic requirement?

Options:

A.

Multi-level cell MLC


B.

Triple-level cell TLC


C.

Quad-level cell QLC


D.

Single-level cell SLC


Expert Solution
Questions # 90:

Sarah, a forensic investigator, is conducting an investigation on a macOS device that is suspected to have been compromised. She is tasked with gathering evidence of unauthorized access to the system. As part of her investigation, she needs to locate information related to when and who accessed the system. In addition to reviewing general system logs. Sarah knows she must focus on certain types of system files that might provide detailed data on unauthorized activities. Which area of the macOS file system would provide the most relevant information regarding logon attempts and other authentication events?

Options:

A.

The User Account data


B.

The LaunchDaemons directory


C.

The Home folder


D.

The Safari history


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 81-90 out of questions