Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CHFI Changed 312-49v11 Questions

Page: 7 / 23
Total 443 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 25

John, a forensic examiner, has been tasked with analyzing an evidence image file acquired from a suspect machine. While conducting his investigation, he discovered a file that appeared to be suspicious. He opened the file in a Hex Editor and found the hex value of the file starting with “89 50 4E”. Based on his analysis, which file type does this hex value correspond to?

Options:

A.

PDF

B.

JPEG

C.

BMP

D.

PNG

Question 26

Sophia, a forensic investigator, has been working on a significant corporate data theft case. The suspect, an IT employee, allegedly downloaded hundreds of confidential files onto his laptop before resigning abruptly. Sophia obtained a search and seizure warrant, and during the execution, she found the suspect ' s laptop, a desktop computer, and several storage devices. To ensure she maintains the chain of custody and abides by the ACPO principles of digital evidence, what should be her next step?

Options:

A.

She should ask the suspect for the passwords to the devices to expedite the investigation.

B.

She should immediately begin analyzing the digital devices on-site.

C.

She should only seize the personal laptop as per the information on the warrant.

D.

She should seize all the devices and send them to a forensic lab for analysis.

Question 27

Charlotte, a cloud administrator, is responsible for managing the cloud infrastructure of a production environment. While monitoring the logs of an Amazon EC2 instance, she notices unusual activity that could indicate a security breach. The logs show abnormal behavior such as multiple failed login attempts, unusual traffic patterns, and unauthorized access to sensitive data on the instance. Concerned about the potential impact of the attack on other instances in the environment, Charlotte realizes she needs to act quickly to prevent the breach from escalating further. She wants to limit the spread of the incident and ensure that other resources in the environment remain unaffected. In this situation, what should Charlotte do first as part of the forensic acquisition of the EC2 instance?

Options:

A.

Provision and launch a forensic workstation

B.

Isolate the compromised EC2 instance

C.

Attach the evidence volume to the forensic workstation

D.

Take a snapshot of the EC2 instance

Question 28

You are a forensic analyst working on a case of a possible cyber-attack on a bank ' s network. You have been provided an image of the suspected machine for examination. To ensure a thorough investigation, you decided to use Autopsy for file system analysis. However, the image is huge, and manually sifting through the data could take weeks. What Autopsy feature can be utilized to expedite the analysis process?

Options:

A.

File carving

B.

Keyword search

C.

Timeline analysis

D.

Image mounting

Page: 7 / 23
Total 443 questions