Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free 312-49v11 Questions Attempt

Page: 4 / 23
Total 443 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 13

During a forensic investigation, the team is responsible for ensuring that the forensic laboratory remains secure. As part of the security protocols, the lab has implemented a system to record all visitors, including details such as name, address, time of visit, and the purpose of the visit. This helps maintain an accurate record of admittance and ensures that only authorized personnel can enter the facility. Which of the following considerations is being followed to maintain this level of security in the lab?

Options:

A.

Human resource considerations that manage the personnel within the lab.

B.

Work area considerations that focus on the design of the workspace and equipment.

C.

Physical access considerations that define protocols surrounding the documentation of all individuals permitted into the premises.

D.

Physical and structural design considerations that address how the lab ' s physical setup supports security and entry controls.

Question 14

After implementing an eDiscovery tool, the forensic investigator is responsible for ensuring that all user actions, and changes to the system are accurately logged. This tracking is essential to ensure that every action taken during the investigation is fully transparent and accountable. By doing so, the investigator ensures that there is a reliable proof of all activities within the eDiscovery process. What type of metric is the investigator most likely focusing on in this scenario?

Options:

A.

Investigator tracks audit trails to ensure a comprehensive record of all modifications.

B.

Investigator focuses on tracking the legal hold imposed on the evidence to ensure compliance.

C.

Investigator tracks the number of files reviewed during the investigation process to assess the workload.

D.

Investigator measures the accuracy of data extraction during the collection phase to ensure data integrity.

Question 15

An online banking system fell victim to a significant security breach. The attacker managed to access confidential customer data and the bank ' s internal communication. During the investigation, the forensic team noticed a pattern of unusual queries containing " & # x 0 0in the system logs. This led them to believe that an exploitation technique may have been used to bypass security filters and firewalls. Based on this information, which type of attack was most likely used?

Options:

A.

Directory Traversal attack.

B.

Command Injection attack.

C.

XML External Entity (XXE) attack.

D.

SQL Injection attack.

Question 16

During a complex investigation, an investigator is tasked with extracting email data from a corrupt file format generated by the organization ' s email client. The investigator requires a tool capable of converting this file into the widely compatible EML format, ensuring that the data is easily accessible for analysis. The tool must also support migration to various email servers and web-based platforms, with advanced filtering options to selectively migrate only relevant data. Which tool would be most suitable for this task?

Options:

A.

Kernel for OST to PST

B.

Email Checker

C.

ZeroBounce

D.

EmailSherlock

Page: 4 / 23
Total 443 questions