Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Legit 312-49v11 Exam Download

Page: 2 / 11
Total 300 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 5

During a network security audit, an investigator is tasked with assessing the security of nearby wireless networks. The investigator needs to gather real-time information about nearby wireless access points (APs) and display this data using diagnostic views and charts. The tool should allow them to visualize details such as signal strength, AP names, and other relevant characteristics of the networks in the area. Which of the following tools would be most appropriate for this task?

Options:

A.

John the Ripper

B.

NetSurveyor

C.

Netcraft

D.

hashcat

Question 6

In a digital forensic investigation, analysts focus on extracting crucial data from SQLite databases found in mobile device memory dumps. These databases, containing information like contacts, text messages, and emails, play a vital role in uncovering evidence pertinent to the investigation. What steps should investigators follow to extract data from an SQLite database?

Options:

A.

Use the SQLite ".dump" command and specify the output file.

B.

Utilize SQLite browsing tools and execute commands like ".extract".

C.

Extract data directly from the device memory dump without using SQLite tools.

D.

Analyze specific database files like "Calendar.sqlitedb" for target calendar events.

Question 7

Stella, a forensic investigator, is analyzing logs from a cloud environment to determine if a password leak has led to the disabling of a user account. She suspects that a change in the login settings may have triggered the account to be locked due to multiple failed login attempts. To verify her hypothesis, she applies various filters to examine the cloud audit logs.

Which of the following filters would help Stella identify if a password leak has disabled a user account?

Options:

A.

protopayload.metadata.event.parameter.value=DOMAIN_NAME

B.

protopayload.resource.labels.service="login.googleapis.com"

C.

logName="organizations/ORGANIZATION_ID/logs/cloudaudit.googleapis.com%2Factivity"

D.

protopayload.resource.labels.service="admin.googleapis.com"

Question 8

As part of a forensic investigation into a suspected data breach at a corporate office, Detective Smith is tasked with gathering evidence from a seized hard drive. The detective aims to extract non-volatile data from the storage media in an unaltered manner to uncover any traces of unauthorized access or tampering. In Detective Smith's investigation of the corporate data breach, which data acquisition process involves extracting non-volatile data from the seized hard drive?

Options:

A.

Dynamic acquisition

B.

Dead acquisition

C.

Volatile acquisition

D.

Live acquisition

Page: 2 / 11
Total 300 questions