Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions
Questions # 121:

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from

Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network

vulnerability assessment plan?

Options:

A.

Their first step is to make a hypothesis of what their final findings will be.


B.

Their first step is to create an initial Executive report to show the management team.


C.

Their first step is to analyze the data they have currently gathered from the company or interviews.


D.

Their first step is the acquisition of required documents, reviewing of security policies and compliance.


Expert Solution
Questions # 122:

What technique is used by JPEGs for compression?

Options:

A.

TIFF-8


B.

ZIP


C.

DCT


D.

TCD


Expert Solution
Questions # 123:

What does Locard's Exchange Principle state?

Options:

A.

Any information of probative value that is either stored or transmitted in a digital form


B.

Digital evidence must have some characteristics to be disclosed in the court of law


C.

Anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave


D.

Forensic investigators face many challenges during forensics investigation of a digital crime, such as extracting, preserving, and analyzing the digital evidence


Expert Solution
Questions # 124:

Which of the following Windows-based tool displays who is logged onto a computer, either locally or remotely?

Options:

A.

Tokenmon


B.

PSLoggedon


C.

TCPView


D.

Process Monitor


Expert Solution
Questions # 125:

What is the purpose of using Obfuscator in malware?

Options:

A.

Execute malicious code in the system


B.

Avoid encryption while passing through a VPN


C.

Avoid detection by security mechanisms


D.

Propagate malware to other connected devices


Expert Solution
Questions # 126:

Pick the statement which does not belong to the Rule 804. Hearsay Exceptions; Declarant Unavailable.

Options:

A.

Statement of personal or family history


B.

Prior statement by witness


C.

Statement against interest


D.

Statement under belief of impending death


Expert Solution
Questions # 127:

What document does the screenshot represent?

Question # 127

Options:

A.

Expert witness form


B.

Search warrant form


C.

Chain of custody form


D.

Evidence collection form


Expert Solution
Questions # 128:

Self-Monitoring, Analysis, and Reporting Technology (SMART) is built into the hard drives to monitor and report system activity. Which of the following is included in the report generated by SMART?

Options:

A.

Power Off time


B.

Logs of high temperatures the drive has reached


C.

All the states (running and discontinued) associated with the OS


D.

List of running processes


Expert Solution
Questions # 129:

Bob has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drives. He wants to recover all the data, which includes his personal photos, music, documents, videos, official emails, etc. Which of the following tools shall resolve Bob's purpose?

Options:

A.

Cain & Abel


B.

Recuva


C.

Xplico


D.

Colasoft’s Capsa


Expert Solution
Questions # 130:

Which Event Correlation approach assumes and predicts what an attacker can do next after the attack by studying statistics and probability?

Options:

A.

Profile/Fingerprint-Based Approach


B.

Bayesian Correlation


C.

Time (Clock Time) or Role-Based Approach


D.

Automated Field Correlation


Expert Solution
Questions # 131:

An investigator is analyzing a checkpoint firewall log and comes across symbols. What type of log is he looking at?

Question # 131

Options:

A.

Security event was monitored but not stopped


B.

Malicious URL detected


C.

An email marked as potential spam


D.

Connection rejected


Expert Solution
Questions # 132:

Chong-lee, a forensics executive, suspects that a malware is continuously making copies of files and folders on a victim system to consume the available disk space. What type of test would confirm his claim?

Options:

A.

File fingerprinting


B.

Identifying file obfuscation


C.

Static analysis


D.

Dynamic analysis


Expert Solution
Questions # 133:

Which forensic investigation methodology believes that criminals commit crimes solely to benefit their criminal enterprises?

Options:

A.

Scientific Working Group on Digital Evidence


B.

Daubert Standard


C.

Enterprise Theory of Investigation


D.

Fyre Standard


Expert Solution
Questions # 134:

Which of these rootkit detection techniques function by comparing a snapshot of the file system, boot records, or memory with a known and trusted baseline?

Options:

A.

Signature-Based Detection


B.

Integrity-Based Detection


C.

Cross View-Based Detection


D.

Heuristic/Behavior-Based Detection


Expert Solution
Questions # 135:

Which of the following statements is TRUE with respect to the Registry settings in the user start-up folder HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\.

Options:

A.

All the values in this subkey run when specific user logs on, as this setting is user-specific


B.

The string specified in the value run executes when user logs on


C.

All the values in this key are executed at system start-up


D.

All values in this subkey run when specific user logs on and then the values are deleted


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions