Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CHFI 312-49v11 Release Date

Page: 10 / 11
Total 300 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 37

During a digital forensic investigation into a suspect's Android device, a forensic expert is tasked with extracting Chrome artifacts such as browsing history, cookies, and cached data. The suspect may have used Chrome for browsing activities related to a cybercrime, and the investigator needs a tool that can efficiently extract this type of information from the device. Which of the following tools can assist the investigator in extracting these Chrome artifacts from an Android device?

Options:

A.

LOIC

B.

Orbot Proxy

C.

DroidSheep

D.

Magnet AXIOM

Question 38

Alice, a seasoned iOS developer, dives into her latest project, an immersive gaming app. She delves into utilizing cutting-edge technologies like OpenGL ES, OpenAL, and AV Foundation. As the lines of code intertwine with her creativity, she inches closer to realizing her dream of delivering an app that mesmerizes users on every level. Which layer of the iOS architecture is Alice primarily focusing on for implementing functionalities?

Options:

A.

Cocoa Touch Layer

B.

Core OS Layer

C.

Core Services Layer

D.

Media Services Layer

Question 39

Kaysen, a forensic investigator, was examining a compromised Windows machine. During the investigation, Kaysen needs to collect crucial information about the applications and services running on the machine to understand the impact of the breach. The investigator must gather real-time volatile evidence, such as active processes and running services, while ensuring that the data collection does not interfere with or alter the system’s state. Which of the following tools will help Kaysen in the above scenario?

Options:

A.

ExifTool

B.

Wireshark

C.

tasklist

D.

Hexinator

Question 40

In a country where the government tightly controls internet access, a cybersecurity analyst suspects that sensitive communications are being monitored. To circumvent this surveillance, the analyst decides to use the Tor network. However, accessing the Tor network directly is impossible due to government restrictions. How can the cybersecurity analyst overcome government surveillance and access the Tor network in this scenario?

Options:

A.

Use bridge nodes to access the Tor network

B.

Utilize publicly listed Tor relay nodes

C.

Establish direct communication with the Tor exit node

D.

Collaborate with government authorities to gain access to the Tor network

Page: 10 / 11
Total 300 questions