Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

312-49v11 Exam Questions Tutorials

Page: 3 / 11
Total 300 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 9

A law enforcement officer arrives at a crime scene at a national border crossing, where a suspect has been arrested in connection with a financial fraud case. During the arrest process, the officer discovers a laptop in the suspect's immediate possession. The laptop contains clear evidence of a crime that is visible to the naked eye. The officer does not have a warrant but needs to secure the device immediately to prevent potential tampering. What is the appropriate action the officer can take in this scenario?

Options:

A.

The officer must immediately obtain a warrant from the top official dealing with the border matters of both nations before searching the laptop.

B.

The officer may search the laptop without a warrant.

C.

The officer can search the laptop without a warrant only if the laptop is locked and cannot be accessed.

D.

The officer must capture a photograph of the evidence and wait until a warrant is obtained to search the laptop.

Question 10

During a digital forensics investigation, a mobile device running Android OS is seized from a suspect. Upon examination, files are discovered indicating interactions with both Windows and Linux systems. In Android and iOS forensic analysis, which of the following is a crucial step when examining files associated with Windows and Linux systems?

Options:

A.

Analyzing files to identify interactions and potential evidence across different operating systems

B.

Focusing only on files native to the mobile device

C.

Extracting data solely from Android and iOS files

D.

Ignoring files associated with Windows and Linux

Question 11

An investigator is working on a complex financial fraud case involving multiple government agencies. As part of the investigation, the investigator seeks to acquire certain government records to help uncover potentially fraudulent activities and determine the full scope of the crime. However, one of the government agencies involved denies access to some of the requested records, citing national security concerns and invoking a statutory exemption. Which law governs the investigator's right to request these records, and which exemption might prevent disclosure?

Options:

A.

The Federal Records Act of 1950

B.

The Freedom of Information Act (FOIA)

C.

The National Information Infrastructure Protection Act of 1996

D.

The Protect America Act of 2007

Question 12

During a complex investigation, an investigator is tasked with extracting email data from a corrupt file format generated by the organization's email client. The investigator requires a tool capable of converting this file into the widely compatible EML format, ensuring that the data is easily accessible for analysis. The tool must also support migration to various email servers and web-based platforms, with advanced filtering options to selectively migrate only relevant data. Which tool would be most suitable for this task?

Options:

A.

Kernel for OST to PST

B.

Email Checker

C.

ZeroBounce

D.

EmailSherlock

Page: 3 / 11
Total 300 questions