Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Passed Exam Today 312-49v11

Page: 9 / 23
Total 443 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 33

In a multinational corporation, there have been increasing reports of system crashes and data leaks from the intranet. Forensic investigators discovered a highly polymorphic worm propagating across the network. The worm quickly changes its structure, making it difficult to analyze its behavior and create signatures. Susan, a cybersecurity analyst, needs to conduct a behavioral analysis of the worm in a secure and controlled environment. Which of the following tools should she use for this purpose?

Options:

A.

Wireshark

B.

Cuckoo Sandbox

C.

IDA Pro

D.

Process Monitor

Question 34

As the senior forensic analyst for an international software development firm, you’re tasked with handling an ongoing investigation into suspected insider threats. Several project files have been reported as missing from the company’s secured servers. In one instance, a junior team member reported receiving an email, seemingly from his manager, instructing him to move specific files to a shared network location. After complying, the files disappeared. As part of your investigation, you have acquired disk images of all systems involved. What should be your next step?

Options:

A.

Perform an immediate analysis of the disk images, focusing on identifying and extracting any potential malware for analysis.

B.

Interview the team member who moved the files to determine if they had any role in the data loss.

C.

Prioritize the retrieval of deleted files from the disk images and scrutinize any software or processes that may have led to their deletion.

D.

Conduct a detailed analysis of the email headers and server logs to identify the origin of the deceptive email.

Question 35

A forensic investigator is performing an eDiscovery process within an organization, following the EDRM framework. The investigator focuses on narrowing down the volume of electronically stored information (ESI) by eliminating unnecessary data and converting it into a more manageable format that can be easily analyzed or examined. The investigator is ensuring that the data is prepared appropriately for the next phase in eDiscovery. Which EDRM stage is the investigator executing in the above scenario?

Options:

A.

The investigator is performing the analysis phase to interpret the data’s significance.

B.

The investigator is executing the production phase to finalize the data for legal use.

C.

The investigator is conducting the review phase to assess the data.

D.

The investigator is handling the processing phase to streamline the data for easier handling.

Question 36

Sophia, a cybersecurity analyst, is investigating a data breach within a company. The breach is suspected to have come from an insider, as sensitive company data was altered from within the company’s network. Sophia needs to determine whether the breach was caused by an insider (someone within the company) or an external attacker (someone from outside the company).

Which of the following factors would most likely indicate that the breach was carried out by an insider?

Options:

A.

The attack used advanced social engineering tactics to exploit external vulnerabilities.

B.

The attack was launched from a known external IP address associated with a hacker group.

C.

The attacker used a distributed denial-of-service (DDoS) attack to overwhelm the network.

D.

The attacker had legitimate access to the company’s internal systems and data.

Page: 9 / 23
Total 443 questions