Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CHFI 312-49v11 ECCouncil Study Notes

Page: 8 / 23
Total 443 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 29

Jennifer, an experienced CHFI investigator, is working on a case involving an international cybercrime ring that has launched numerous attacks on multiple corporations across the globe. One of the attacks involved breaching a large bank ' s security system and transferring millions of dollars into untraceable offshore accounts. The investigation has spanned several months and across multiple jurisdictions. Recently, a tip leads Jennifer to a local suspect ' s home, where she believes crucial digital evidence may be stored. However, the suspect is a citizen of another country, and his home is protected under diplomatic immunity laws. The situation is further complicated by the bank ' s impatient demand for resolution and the suspect ' s insistence on his right to privacy. Jennifer needs to balance her respect for legal boundaries with the urgency of resolving the case. What should she do?

Options:

A.

She should wait until the suspect leaves the country and then seize his computer.

B.

She should use a decryption tool to remotely access the suspect ' s computer and gather the evidence.

C.

She should consult legal counsel and try to obtain a warrant under international law.

D.

She should sneak into the suspect ' s home while he is away and try to collect the evidence.

Question 30

During a cybercrime investigation, investigators obtain a warrant to search a suspect ' s computer system for evidence of hacking activities. As they collect data from the suspect ' s electronic devices, they inadvertently access information revealing the identities of other users connected to the system.

Which step in the cybercrime investigation process raises concerns related to privacy issues?

Options:

A.

Implementing network security measures

B.

Conducting forensic analysis

C.

Preserving the anonymity of other users

D.

Obtaining search warrants

Question 31

Detective Sarah, a skilled digital forensics investigator, begins probing a compromised computer system linked to a cybercrime ring. Prioritizing volatile data, she meticulously plans her evidence-collection strategy. Amidst the investigation, various data sources emerge, each holding potential clues to unraveling the illicit scheme.

Which data source should you prioritize for collection, considering the order of volatility outlined in the RFC 3227 guidelines?

Options:

A.

Disk or other storage media containing potentially critical files

B.

Temporary file systems where recent activity might be stored

C.

Archival media such as a DVD-ROM or a CD-ROM

D.

The physical configuration and network topology of the system

Question 32

Ryan, a computer forensic investigator, was tasked with a case involving the illegal dissemination of confidential data within a large corporation. The suspected employee worked in an office where everyone had access to a Network Attached Storage (NAS) device, making it an area of interest. The NAS used a Linux-based filesystem. A recent upgrade led to a complete wipe and restoration of the data on the NAS. To complicate matters, the corporation also had a Storage Area Network (SAN) in use, suspected to be another source of confidential data leakage. Understanding the idiosyncrasies of NAS and SAN storage systems, what is the best approach for Ryan to begin his investigation?

Options:

A.

Ryan should aim to reconstruct the RAID configurations, if any, of the NAS and SAN systems before attempting data recovery.

B.

Ryan should focus on the SAN first, as it is likely the source of larger data leaks.

C.

Ryan should immediately create a physical image of both NAS and SAN devices.

D.

Ryan should recover deleted files from the NAS device using a popular Windows-based recovery tool.

Page: 8 / 23
Total 443 questions