Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECCouncil 312-49v11 Online Access

Page: 5 / 23
Total 443 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 17

An organization is working to minimize the eDiscovery costs associated with the extensive analysis of large sets of electronic data. To achieve this, the organization employs advanced methodologies and automated processes that allow them to effectively narrow down the amount of data that requires detailed examination, thus enhancing efficiency while maintaining compliance. By utilizing specific platforms and processes, the organization ensures that only the pertinent data is analyzed, and redundant data is excluded early in the workflow.

Which best practice is the organization implementing to ensure efficient data examination?

Options:

A.

The organization implements a data retention tool to securely dispose of data that is no longer necessary.

B.

The organization uses technology-assisted review (TAR) and data reduction tools to exclude irrelevant data from the review process.

C.

The organization employs tools to ensure a secure chain of custody throughout the entire eDiscovery process.

D.

The organization uses data mapping tools to identify custodians and track the location of relevant data.

Question 18

Following a data breach at a global financial institution, the company ' s incident response team has been working tirelessly to identify the breach ' s origin. The database administrator noticed that some tables within the company ' s SQL Server database were altered. She found that there were changes made in the order history, financials, and customer details. The transaction log showed modifications with numerous queries which were quite uncommon. It seemed the attacker gained access via a remote connection, suggesting that the login details might have been compromised. As a forensic investigator, what would be your next step to identify the source of the breach?

Options:

A.

You would need to evaluate the server logs for unusual login patterns.

B.

You would need to perform a complete system scan.

C.

You would need to assess the most recently accessed files.

D.

You would need to identify the source IP from where the connection was initiated.

Question 19

You ' re a digital forensics investigator tasked with analyzing a bitmap image file (BMP) to gather information about its structure and contents. Understanding the file structure and data components is essential for conducting a thorough analysis. Which component of a bitmap image file contains data about the type, size, and layout of the file?

Options:

A.

File header

B.

Image data

C.

Information header

D.

RGBQUAD array

Question 20

Arnold, a forensic investigator, was tasked with analyzing a corporate network that was suspected of having unauthorized access points. He was particularly concerned about the possibility of rogue access points that might have been introduced by an attacker. To gain full visibility into the network and its components, Arnold employed a forensic tool that allowed him to analyze network traffic, monitor various access points for anomalies, and detect suspicious behaviors indicative of rogue devices. Arnold examined the log data provided by the tool, which gave him insights into the network ' s activities and helped him confirm whether any unauthorized devices were operating on the network. Which tool did Arnold employ in the above scenario?

Options:

A.

Time Machine

B.

Promqry

C.

Freta

D.

Security Onion

Page: 5 / 23
Total 443 questions