Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free 312-49v11 Questions Attempt

Page: 4 / 11
Total 300 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 13

Madison, a forensic investigator, has been assigned to investigate a case of email fraud, where the suspect allegedly used a compromised email account to send phishing emails to several victims. As part of the investigation, Madison must first obtain permission to conduct an on-site examination of the suspect's machine and the email server used for the fraudulent emails.

What is the initial step that Madison must take before proceeding with the forensic examination?

Options:

A.

Seizing the computer and email accounts

B.

Retrieving email headers

C.

Recovering deleted email messages

D.

Analyzing email headers

Question 14

Investigators conduct forensic analysis to examine Tor Browser activity. They scrutinize memory dumps to extract email artifacts and analyze storage devices for email attachments, both with the Tor Browser open and closed. Additionally, they explore forensic options post-uninstallation of the Tor Browser to uncover any residual evidence.

What is the primary objective of forensic analysis in scenarios involving the Tor Browser?

Options:

A.

To analyze email attachments solely when the Tor Browser is closed

B.

To explore email artifacts and attachments with the Tor Browser in various states

C.

To examine email artifacts only when the Tor Browser is open

D.

To perform analysis post-uninstallation of the Tor Browser

Question 15

During a security audit of a web application, suspicious activity indicative of adirectory traversal attackis detected in the server logs. The attack appears to exploit vulnerabilities to gain unauthorized access to sensitive files and directories.

In digital forensics, what is theprimary objectiveof investigating a directory traversal attack?

Options:

A.

To identify potential loopholes in server hardware configurations

B.

To optimize network bandwidth and reduce latency

C.

To determine the extent of unauthorized access and data compromise

D.

To enhance user experience on the web application

Question 16

During a cybercrime investigation involving a large-scale data breach, the investigator uncovers that the evidence is distributed across several cloud-based platforms, with the data hosted on servers in multiple countries. Although the investigator has secured the necessary legal authorizations, including international warrants and data access approvals, they are encountering significant hurdles in retrieving the data due to the complexities of multi-jurisdictional cloud repositories. These issues are causing considerable delays, hindering the timely collection of critical evidence needed to identify the perpetrators.

What is the primary challenge the investigator is facing in this case?

Options:

A.

Limited legal understanding and inadequate technical knowledge of the laws involved across different cloud-based services and jurisdictions.

B.

Lack of forensic readiness in cloud environments, preventing evidence collection.

C.

Volatile nature of evidence, with crucial logs being lost or overwritten in cloud environments.

D.

Data storage in multiple jurisdictions, leading to issues in accessing evidence.

Page: 4 / 11
Total 300 questions