Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil CHFI 312-49v11 Questions and answers with Dumpstech

Exam 312-49v11 Premium Access

View all detail and faqs for the 312-49v11 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions
Questions # 71:

Kaysen, a forensic investigator, was examining a compromised Windows machine. During the investigation, Kaysen needs to collect crucial information about the applications and services running on the machine to understand the impact of the breach. The investigator must gather real-time volatile evidence, such as active processes and running services, while ensuring that the data collection does not interfere with or alter the system’s state. Which of the following tools will help Kaysen in the above scenario?

Options:

A.

ExifTool

B.

Wireshark

C.

tasklist

D.

Hexinator

Questions # 72:

During a network security audit, an investigator is tasked with assessing the security of nearby wireless networks. The investigator needs to gather real-time information about nearby wireless access points (APs) and display this data using diagnostic views and charts. The tool should allow them to visualize details such as signal strength, AP names, and other relevant characteristics of the networks in the area. Which of the following tools would be most appropriate for this task?

Options:

A.

John the Ripper

B.

NetSurveyor

C.

Netcraft

D.

hashcat

Questions # 73:

An investigator is examining a hard disk and finds a large amount of unused space between two partitions. This space contains hidden data not recognized by the operating system.

Which of the following methods can be used to access this hidden data during a forensic investigation?

Options:

A.

Performing a full disk backup

B.

Reformatting the disk to remove the hidden data

C.

Running a disk cleanup utility

D.

Using disk editor tools to examine the inter-partition gap

Questions # 74:

Investigators conduct forensic analysis to examine Tor Browser activity. They scrutinize memory dumps to extract email artifacts and analyze storage devices for email attachments, both with the Tor Browser open and closed. Additionally, they explore forensic options post-uninstallation of the Tor Browser to uncover any residual evidence.

What is the primary objective of forensic analysis in scenarios involving the Tor Browser?

Options:

A.

To analyze email attachments solely when the Tor Browser is closed

B.

To explore email artifacts and attachments with the Tor Browser in various states

C.

To examine email artifacts only when the Tor Browser is open

D.

To perform analysis post-uninstallation of the Tor Browser

Questions # 75:

Sarah, a forensic investigator, is conducting a post-compromise investigation on a company’s server that contains sensitive data. To ensure the deleted files do not fall into the wrong hands, she follows amedia sanitization procedure. The process involvesoverwriting the deleted data 6 times with alternating sequences of 0x00 and 0xFF, followed by a final overwrite using the pattern 0xAA.

Which of the following media sanitization standards has Sarah followed in this scenario?

Options:

A.

NAVSO P-5239-26 (MFM)

B.

GOST P50739-95

C.

VSITR

D.

DoD 5220.22-M

Questions # 76:

Detective Patel, investigating a cross-border cybercrime, faces challenges in gathering evidence due to jurisdictional differences and the remote nature of the attack.

In the context of cross-border cybercrimes, what primary challenge does Detective Patel encounter in collecting evidence for prosecution?

Options:

A.

Navigate diverse legal frameworks for digital evidence across jurisdictions.

B.

Perform physical surveillance to track remote attackers across borders.

C.

Coordinate international raids simultaneously.

D.

Use advanced encryption for secure data transmission.

Questions # 77:

Ethan, a forensic investigator, is analyzing a suspect's computer and finds a suspicious file that may be related to a cybercrime. Upon examining the file's metadata, Ethan discovers that the file has been modified several times and was last accessed shortly before the crime took place. Which of the following forensic methods would be most useful for Ethan to determine whether the file was tampered with or manipulated?

Options:

A.

Review the file's file system logs

B.

Look for hidden attributes or alternate data streams

C.

Check the file's access control list (ACL)

D.

Examine the file's hash value

Questions # 78:

During a forensic investigation into a recent security incident within an organization, the investigator is tasked with documenting every action taken with the evidence to ensure proper chain of custody. The investigator carefully documents every action taken with the evidence in a logbook. The evidence is tagged with unique identifiers to prevent confusion. A detailed chain of custody record is also created to track the evidence's movement and handling throughout the investigation. Which investigation step is the investigator performing in this scenario?

Options:

A.

The investigator is preserving the evidence collected from the incident site.

B.

The investigator is performing scoping on the location where the security incident took place.

C.

The investigator is carrying out data analysis on the evidence for potential findings related to the breach.

D.

The investigator is conducting a search and seizure of the evidence related to the security incident.

Questions # 79:

In a RAID 1 setup, a company's critical database is stored across two mirrored hard drives. During a routine system check, one of the hard drives suddenly fails due to a hardware malfunction. The redundant data stored on the remaining drive ensures that the database remains intact and accessible, allowing the company to continue operations without any data loss. How does RAID 1 ensure data integrity and availability in the event of a hard drive failure?

Options:

A.

Needs a full rebuild for redundancy restoration.

B.

Duplicates data, ensuring immediate access and protection.

C.

Prioritizes single drive, impacting read/write speed.

D.

Relies on parity for data recovery.

Questions # 80:

An investigator is working on a complex financial fraud case involving multiple government agencies. As part of the investigation, the investigator seeks to acquire certain government records to help uncover potentially fraudulent activities and determine the full scope of the crime. However, one of the government agencies involved denies access to some of the requested records, citing national security concerns and invoking a statutory exemption. Which law governs the investigator's right to request these records, and which exemption might prevent disclosure?

Options:

A.

The Federal Records Act of 1950

B.

The Freedom of Information Act (FOIA)

C.

The National Information Infrastructure Protection Act of 1996

D.

The Protect America Act of 2007

Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions