Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil CHFI 312-49v11 Questions and answers with Dumpstech

Exam 312-49v11 Premium Access

View all detail and faqs for the 312-49v11 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions
Questions # 31:

During a live data acquisition procedure, forensic investigators are tasked with analyzing a suspected breach of a corporate network. The breach involves unauthorized access to sensitive files stored on the company's servers. Investigators aim to gather volatile data to trace the origin of the breach and identify potential network vulnerabilities.

In a live data acquisition scenario, which types of volatile data would investigators prioritize capturing to trace the intrusion's origin and identify network vulnerabilities?

Options:

A.

Printer driver versions and configurations

B.

Current system uptime and DLLs loaded

C.

Open connections and routing information

D.

Mouse click activity and cursor movements

Questions # 32:

During a security audit of a web application, suspicious activity indicative of adirectory traversal attackis detected in the server logs. The attack appears to exploit vulnerabilities to gain unauthorized access to sensitive files and directories.

In digital forensics, what is theprimary objectiveof investigating a directory traversal attack?

Options:

A.

To identify potential loopholes in server hardware configurations

B.

To optimize network bandwidth and reduce latency

C.

To determine the extent of unauthorized access and data compromise

D.

To enhance user experience on the web application

Questions # 33:

Following a cybersecurity incident at an organization, a forensic investigator is tasked with collectingElectronically Stored Information (ESI)as part of the investigation. To streamline the data collection process, the investigator restricts the range and size of ESI from custodians, limiting the collection tospecific file types and directorieson a computer. This approach ensures that only relevant information is collected while minimizing the impact on other devices. Which eDiscovery collection methodology is being used in this scenario?

Options:

A.

Investigator leverages custodian self-collection to gather sensitive evidence data.

B.

Investigator uses incremental collection, focusing on newly created or modified data.

C.

Investigator uses remote acquisition of data from custodians' systems via network connections.

D.

Investigator employs a directed collection of definite data sets and system areas.

Questions # 34:

Hazel, a forensic investigator, is analyzing the SSH logs on a Linux server usingjournalctl. She needs to extract thefingerprint of the SSH keyfrom the logs to trace any potential unauthorized access. Which of the following commands should Hazel execute to view the SSH key fingerprint in the SSH unit logs?

Options:

A.

journalctl -u ssh --since yesterday

B.

journalctl -fu ssh

C.

journalctl -u ssh --since -1h

D.

journalctl -u ssh

Questions # 35:

During a forensic investigation into a cyberattack that compromised a company’s sensitive data, the investigator discovers that the organization uses a cloud-based solution for managing user access across various internal systems. This solution includes features such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and detailed access controls, all handled by a third-party service provider. The investigator examines logs from the authentication system and compares them with system access patterns to trace the illegal actions during the breach. What type of cloud service deployment is being utilized by the organization?

Options:

A.

The organization uses Desktop-as-a-Service (DaaS) for access controls or authentication management.

B.

The organization uses Infrastructure-as-a-Service (IaaS) for managing user access on systems and the network.

C.

The organization uses Platform-as-a-Service (PaaS) to deploy and manage custom-built authentication and access control applications.

D.

The organization uses Identity-as-a-Service (IDaaS) for enforcing authorization rules.

Questions # 36:

During a routine network audit, the cybersecurity team at a large organization detects unusual network traffic patterns and unauthorized access attempts to sensitive systems, indicating a potential security breach. In accordance with theIncident Response Process Flow, what should be the immediate priority for the cybersecurity teamafter various third-party vendors and clients are informed of the incident?

Options:

A.

Containment

B.

Eradication

C.

Incident Triage

D.

Incident Recording and Assignment

Questions # 37:

A digital forensic investigator is examining a mobile device recovered from a suspect in a cybercrime case. The device appears to be running a custom operating system configuration that allows forelevated privileges and unrestricted access to system resources.

What is the most likely method used to achieve this configuration?

Options:

A.

Installing a custom ROM on the Android device

B.

Exploiting a vulnerability in the iOS device's firmware

C.

Rooting the Android device

D.

Jailbreaking the iOS device

Questions # 38:

Eliana, a network administrator, is tasked with monitoring FTP traffic on her organization’s network. She suspects that there might be ongoing password cracking attempts targeting the FTP server. To effectively monitor the situation, she needs to track all the unsuccessful login attempts on the FTP server. Given the network traffic, which of the following Wireshark display filters should Eliana apply to identify all the failed login attempts on the FTP server?

Options:

A.

ftp.response.code == 532

B.

ftp.response.code == 230

C.

ftp.response.code == 530

D.

ftp.response.code == 521

Questions # 39:

During a cybercrime investigation, the forensic team has seized a large number of devices as part of the evidence collection process. After securing all the devices, the team begins evaluating which exhibits to prioritize for analysis first. The team maintains detailed records of both analyzed and non-analyzed exhibits, ensuring that they can track the progress of the investigation and reference any exhibits that were not immediately analyzed.

Which ENFSI best practice is being followed by the team?

Options:

A.

The team conducts an initial case evaluation to assess the case’s requirements.

B.

The team performs a scene assessment to handle evidence at the crime scene.

C.

The team carries out a laboratory assessment to document artifacts.

D.

The team executes the acquisition of data to extract data from the seized devices.

Questions # 40:

A digital forensic investigator is tasked with analyzing anNTFS image fileextracted from a pen drive. They leverageThe Sleuth Kit (TSK)for this task, specifically utilizing thefsstatcommand-line tool. By employing fsstat, they delve into the file system’s intricate details, such as metadata, inode numbers, and block or cluster information, thereby facilitating a comprehensive examination.

How can an investigator use TSK to analyze disk images?

Options:

A.

By performing network scans

B.

By conducting manual inspections

C.

By using the plug-in framework

D.

By writing custom code

Viewing page 4 out of 14 pages
Viewing questions 31-40 out of questions