Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Computer Hacking Forensic Investigator (CHFI-v10)

Last Update 22 hours ago Total Questions : 704

The Computer Hacking Forensic Investigator (CHFI-v10) content is now fully updated, with all current exam questions added 22 hours ago. Deciding to include 312-49v10 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 312-49v10 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 312-49v10 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Computer Hacking Forensic Investigator (CHFI-v10) practice test comfortably within the allotted time.

Question # 166

Jason discovered a file named $RIYG6VR.doc in the C:\$Recycle.Bin\ < USER SID > \ while analyzing a hard disk image for the deleted data. What inferences can he make from the file name?

A.

It is a doc file deleted in seventh sequential order

B.

RIYG6VR.doc is the name of the doc file deleted from the system

C.

It is file deleted from R drive

D.

It is a deleted doc file

Question # 167

In forensics.______are used lo view stored or deleted data from both files and disk sectors.

A.

Hash algorithms

B.

SI EM tools

C.

Host interfaces

D.

Hex editors

Question # 168

When installed on a Windows machine, which port does the Tor browser use to establish a network connection via Tor nodes?

A.

7680

B.

49667/49668

C.

9150/9151

D.

49664/49665

Question # 169

This law sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.

A.

The CAN-SPAM act

B.

Federal Spam act

C.

Telemarketing act

D.

European Anti-Spam act

Question # 170

Choose the layer in iOS architecture that provides frameworks for iOS app development?

A.

Media services

B.

Cocoa Touch

C.

Core services

D.

Core OS

Question # 171

" To ensure that the digital evidence is collected, preserved, examined, or transferred In a manner safeguarding the accuracy and reliability of the evidence, law enforcement, and forensics organizations must establish and maintain an effective quality system " Is a principle established by:

A.

NCIS

B.

NIST

C.

EC-Council

D.

SWGDE

Question # 172

Which layer in the loT architecture is comprised of hardware parts such as sensors, RFID tags, and devices that play an important role in data collection?

A.

Middleware layer

B.

Edge technology layer

C.

Application layer

D.

Access gateway layer

Question # 173

Williamson is a forensic investigator. While investigating a case of data breach at a company, he is maintaining a document that records details such as the forensic processes applied on the collected evidence, particulars of people handling It. the dates and times when it Is being handled, and the place of storage of the evidence. What do you call this document?

A.

Consent form

B.

Log book

C.

Authorization form

D.

Chain of custody

Question # 174

Which following forensic tool allows investigator to det ect and extract hidden streams on NTFS drive?

A.

Stream Detector

B.

TimeStomp

C.

Autopsy

D.

analyzeMFT

Question # 175

Consider a scenario where the perpetrator of a dark web crime has unlnstalled Tor browser from their computer after committing the crime. The computer has been seized by law enforcement so they can Investigate It for artifacts of Tor browser usage. Which of the following should the Investigators examine to establish the use of Tor browser on the suspect machine?

A.

Swap files

B.

Files in Recycle Bin

C.

Security logs

D.

Prefetch files

Question # 176

" In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to explain his/her actions and the impact of those actions on the evidence, in the court. " Which ACPO principle states this?

A.

Principle 1

B.

Principle 3

C.

Principle 4

D.

Principle 2

Question # 177

Matthew has been assigned the task of analyzing a suspicious MS Office document via static analysis over an Ubuntu-based forensic machine. He wants to see what type of document It Is. whether It Is encrypted, or contains any flash objects/VBA macros. Which of the following python-based script should he run to get relevant information?

A.

oleform.py

B.

oleid.py

C.

oledir.py

D.

pdfid.py

Question # 178

Which of the following statements pertaining to First Response is true?

A.

First Response is a part of the investigation phase

B.

First Response is a part of the post-investigation phase

C.

First Response is a part of the pre-investigation phase

D.

First Response is neither a part of pre-investigation phase nor a part of investigation phase. It only involves attending to a crime scene first and taking measures that assist forensic investigators in executing their tasks in the investigation phase more efficiently

Question # 179

Rule 1002 of Federal Rules of Evidence (US) talks about_____

A.

Admissibility of original

B.

Admissibility of duplicates

C.

Requirement of original

D.

Admissibility of other evidence of contents

Question # 180

An investigator wants to extract passwords from SAM and System Files. Which tool can the Investigator use to obtain a list of users, passwords, and their hashes In this case?

A.

PWdump7

B.

HashKey

C.

Nuix

D.

FileMerlin

Go to page: