Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CHFI 312-49v11 Dumps PDF

Page: 11 / 23
Total 443 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 41

James, a compliance officer at a financial institution, is tasked with reviewing the company ' s data protection policies to ensure they meet regulatory requirements. The company offers a range of financial products and services, including loans, investment advice, and insurance. During his review, James notices that the company provides customers with clear information about its data-sharing practices and has implemented measures to protect sensitive data. He is confident that the company is adhering to a law enacted in 1999 that mandates financial institutions to explain their information sharing practices and safeguard sensitive data. Which of the following laws is James ensuring compliance with?

Options:

A.

GDPR

B.

HIPAA

C.

PCI DSS

D.

GLBA

Question 42

Greg, a seasoned CHFI professional, has been contracted to investigate a case of intellectual property theft at a major software company. While working on the case, he discovered that the company ' s email server might hold crucial evidence. However, the server is shared with a different company, and accessing it might risk violating that company ' s privacy rights. To respect the rules and regulations about the search and seizure of evidence, what should Greg ' s initial approach be in this scenario?

Options:

A.

Consult with legal experts and the company ' s management to explore the best way forward

B.

Avoid the email server and focus on other potential sources of evidence

C.

Ignore potential privacy violations and seize the server

D.

Immediately obtain a warrant to search and seize the server

Question 43

A suspected cyber-criminal was captured, and his computer was seized while he was online. The investigators found that the Tor Browser was open, and some dark websites were visited. They want to obtain as much information as possible from this active session. The investigator needs to decide between collecting a memory dump or powering down the machine for hard drive analysis. Which option would provide the most information in this situation?

Options:

A.

Shutting down the computer and analyzing the hard drive.

B.

Restarting the machine in safe mode and conduct a system scan.

C.

Unplugging the machine immediately to preserve the hardware integrity.

D.

Leaving the computer running and collecting a memory dump.

Question 44

Liam, a forensic investigator, is tasked with extracting information from a suspect ' s Windows 11 machine. He needs to examine any relevant data from the Sticky Notes application, which may contain information about the suspects activities. To accomplish this, Liam decides to use Python to access the Sticky Notes database file and extract the data for analysis. Which of the following paths should Liam use to locate the Sticky Notes database file on the suspect ' s Windows 11 system?

Options:

A.

C:\Windows\System32\plum.sqlite

B.

C:\Program Files\Microsoft Sticky Notes\plum.sqlite

C.

C:\Users\AppData\Local\Packages\Microsoft.MicrosoftSticky Notes.8wekyb3d8bbwe\LocalState\plum.sqlite

D.

C:\Users\Documents\StickyNotes.db

Page: 11 / 23
Total 443 questions