Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CHFI 312-49v11 Dumps PDF

Page: 11 / 11
Total 300 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 41

Emily, a network security analyst, is reviewing the logs generated by a Cisco firewall after a suspected attack on the company's network. She encounters a log message related to a connection attempt that seems suspicious. The log shows an entry with mnemonic 106022. Based on the firewall's logging patterns, which of the following best describes the log message Emily found?

Options:

A.

Deny protocol connection spoof from source_address to dest_address on interface interface_name

B.

ICMP packet type ICMP_type denied by outbound list acl_ID src inside_address dest outside_address

C.

Deny protocol reverse path check from source_address to dest_address on interface interface_name

D.

Deny IP teardrop fragment (size = number, offset = number) from IP_address to IP_address

Question 42

As an IoT forensic investigator, you are tasked with investigating a cybercrime involving a compromised Smart TV and other IoT devices. The investigation requires extracting data from various IoT devices, including drones, wearables, and SD cards, to gather crucial evidence. You need a tool capable of performing both physical and logical extractions from these devices, covering mobile devices running Android, iOS, Tizen OS, and chip-off memory sources. Which of the following tools would be most suitable for this investigation?

Options:

A.

DoubleSpace

B.

MD-NEXT

C.

EpochConverter

D.

Systemctl

Question 43

Sophia, a network security analyst, is reviewing the logs from a Cisco router in an attempt to identify suspicious traffic patterns. She encounters a log entry that matches the criteria for an access control list (ACL) filter, showing that a TCP or UDP packet was detected based on the applied rules. Based on the log entry description, which of the following is the correct mnemonic for this log message?

Options:

A.

%IPV6-6-ACCESSLOGP

B.

%SEC-6-IPACCESSLOGRL

C.

%SEC-6-IPACCESSLOGP

D.

%SEC-4-TOOMANY

Question 44

In a digital forensics investigation, persistent malware is discovered on a compromised system despite repeated attempts to remove it. The malware reinstalls itself upon system reboot, indicating sophisticated persistence mechanisms.

In digital forensics, why is identifying malware persistence important?

Options:

A.

To prevent future infections and ensure the long-term security of the system

B.

To enhance system performance

C.

To determine the geographical origin of the malware

D.

To optimize network bandwidth and reduce latency

Page: 11 / 11
Total 300 questions