Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions
Questions # 76:

A small law firm located in the Midwest has possibly been breached by a computer hacker looking to obtain information on their clientele. The law firm does not have any on-site IT employees, but wants to search for evidence of the breach themselves to prevent any possible media attention. Why would this not be recommended?

Options:

A.

Searching for evidence themselves would not have any ill effects


B.

Searching could possibly crash the machine or device


C.

Searching creates cache files, which would hinder the investigation


D.

Searching can change date/time stamps


Expert Solution
Questions # 77:

In handling computer-related incidents, which IT role should be responsible for recovery, containment, and prevention to constituents?

Options:

A.

Security Administrator


B.

Network Administrator


C.

Director of Information Technology


D.

Director of Administration


Expert Solution
Questions # 78:

Files stored in the Recycle Bin in its physical location are renamed as Dxy.ext, where “x” represents the ___________________.

Options:

A.

Drive name


B.

Original file name’s extension


C.

Sequential number


D.

Original file name


Expert Solution
Questions # 79:

Which of the following tool enables data acquisition and duplication?

Options:

A.

Colasoft’s Capsa


B.

DriveSpy


C.

Wireshark


D.

Xplico


Expert Solution
Questions # 80:

Which program is the bootloader when Windows XP starts up?

Options:

A.

KERNEL.EXE


B.

NTLDR


C.

LOADER


D.

LILO


Expert Solution
Questions # 81:

Where are files temporarily written in Unix when printing?

Options:

A.

/usr/spool


B.

/var/print


C.

/spool


D.

/var/spool


Expert Solution
Questions # 82:

In the following email header, where did the email first originate from?

Question # 82

Options:

A.

Somedomain.com


B.

Smtp1.somedomain.com


C.

Simon1.state.ok.gov.us


D.

David1.state.ok.gov.us


Expert Solution
Questions # 83:

Why should you never power on a computer that you need to acquire digital evidence from?

Options:

A.

When the computer boots up, files are written to the computer rendering the data nclean


B.

When the computer boots up, the system cache is cleared which could destroy evidence


C.

When the computer boots up, data in the memory buffer is cleared which could destroy evidence


D.

Powering on a computer has no affect when needing to acquire digital evidence from it


Expert Solution
Questions # 84:

To check for POP3 traffic using Ethereal, what port should an investigator search by?

Options:

A.

143


B.

25


C.

110


D.

125


Expert Solution
Questions # 85:

Which network attack is described by the following statement? "At least five Russian major banks came under a continuous hacker attack, although online client services were not disrupted. The attack came from a wide-scale botnet involving at least 24,000 computers, located in 30 countries."

Options:

A.

Man-in-the-Middle Attack


B.

Sniffer Attack


C.

Buffer Overflow


D.

DDoS


Expert Solution
Questions # 86:

What type of attack sends spoofed UDP packets (instead of ping packets) with a fake source address to the IP broadcast address of a large network?

Options:

A.

Fraggle


B.

Smurf scan


C.

SYN flood


D.

Teardrop


Expert Solution
Questions # 87:

Which of the following reports are delivered under oath to a board of directors/managers/panel of the jury?

Options:

A.

Written Formal Report


B.

Verbal Formal Report


C.

Verbal Informal Report


D.

Written Informal Report


Expert Solution
Questions # 88:

Which of the following file contains the traces of the applications installed, run, or uninstalled from a system?

Options:

A.

Shortcut Files


B.

Virtual files


C.

Prefetch Files


D.

Image Files


Expert Solution
Questions # 89:

Madison is on trial for allegedly breaking into her university’s internal network. The police raided her dorm room and seized all of her computer equipment. Madison’s lawyer is trying to convince the judge that the seizure was unfounded and baseless. Under which US Amendment is Madison’s lawyer trying to prove the police violated?

Options:

A.

The 4th Amendment


B.

The 1st Amendment


C.

The 10th Amendment


D.

The 5th Amendment


Expert Solution
Questions # 90:

When is it appropriate to use computer forensics?

Options:

A.

If copyright and intellectual property theft/misuse has occurred


B.

If employees do not care for their boss management techniques


C.

If sales drop off for no apparent reason for an extended period of time


D.

If a financial institution is burglarized by robbers


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions