최신EC-COUNCIL Computer Hacking Forensic Investigator (CHFI-v11) - 312-49v11무료샘플문제
문제1
Which of the following files DOES NOT use Object Linking and Embedding (OLE) technology to embed and link to other objects?
Which of the following files DOES NOT use Object Linking and Embedding (OLE) technology to embed and link to other objects?
정답: B
문제2
During an Investigation. Noel found a SIM card from the suspect's mobile. The ICCID on the card is 8944245252001451548.
What does the first four digits (89 and 44) In the ICCID represent?
During an Investigation. Noel found a SIM card from the suspect's mobile. The ICCID on the card is 8944245252001451548.
What does the first four digits (89 and 44) In the ICCID represent?
정답: A
문제3
A computer forensics investigator is analyzing a hard disk drive (HDD) that is suspected to contain evidence of criminal activity. The HDD has 20,000 cylinders, 16 heads, and 63 sectors per track, with each sector having 512 bytes. During the analysis, the investigator discovered a file of 1.5KB in size on the disk. How many sectors are allocated for the file, and what could be the consequences of such allocation for the investigation?
A computer forensics investigator is analyzing a hard disk drive (HDD) that is suspected to contain evidence of criminal activity. The HDD has 20,000 cylinders, 16 heads, and 63 sectors per track, with each sector having 512 bytes. During the analysis, the investigator discovered a file of 1.5KB in size on the disk. How many sectors are allocated for the file, and what could be the consequences of such allocation for the investigation?
정답: C
문제4
Which device in a wireless local area network (WLAN) determines the next network point to which a packet should be forwarded toward its destination?
Which device in a wireless local area network (WLAN) determines the next network point to which a packet should be forwarded toward its destination?
정답: C
문제5
File signature analysis involves collecting information from the __________ of a file to determine the type and function of the file
File signature analysis involves collecting information from the __________ of a file to determine the type and function of the file
정답: C
문제6
What must an investigator do before disconnecting an iPod from any type of computer?
What must an investigator do before disconnecting an iPod from any type of computer?
정답: B
문제7
Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:
Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:
정답: D
문제8
If you discover a criminal act while investigating a corporate policy abuse, it becomes a public- sector investigation and should be referred to law enforcement?
If you discover a criminal act while investigating a corporate policy abuse, it becomes a public- sector investigation and should be referred to law enforcement?
정답: A
문제9
A forensic investigator encounters a suspicious executable on a compromised system, believed to be packed using a known program packer, and is password-protected. The investigator has knowledge of the tool used for packing and has the corresponding unpacking tool. What should be the next best course of action to examine the executable?
A forensic investigator encounters a suspicious executable on a compromised system, believed to be packed using a known program packer, and is password-protected. The investigator has knowledge of the tool used for packing and has the corresponding unpacking tool. What should be the next best course of action to examine the executable?
정답: C
문제10
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame.
Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame.
정답: D
문제11
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?
George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?
정답: B
문제12
What is a bit-stream copy?
What is a bit-stream copy?
정답: A
문제13
Matthew has been assigned the task of analyzing a suspicious MS Office document via static analysis over an Ubuntu-based forensic machine. He wants to see what type of document It Is.
whether It Is encrypted, or contains any flash objects/VBA macros. Which of the following python- based script should he run to get relevant information?
Matthew has been assigned the task of analyzing a suspicious MS Office document via static analysis over an Ubuntu-based forensic machine. He wants to see what type of document It Is.
whether It Is encrypted, or contains any flash objects/VBA macros. Which of the following python- based script should he run to get relevant information?
정답: B
문제14
Mobile phone forensics is the science of recovering digital evidence from a mobile phone under forensically sound conditions.
Mobile phone forensics is the science of recovering digital evidence from a mobile phone under forensically sound conditions.
정답: A
문제15
As a security analyst you setup a false survey website that will reQuire users to create a username and a strong password. You send the link to all the employees of the company.
What information will you be able to gather?
As a security analyst you setup a false survey website that will reQuire users to create a username and a strong password. You send the link to all the employees of the company.
What information will you be able to gather?
정답: A
문제16
Which of the following does not describe the type of data density on a hard disk?
Which of the following does not describe the type of data density on a hard disk?
정답: A