ECCouncil 312-49v10 - Computer Hacking Forensic Investigator (CHFI-v10)
Which of the following examinations refers to the process of providing the opposing side in a trial the opportunity to question a witness?
While collecting Active Transaction Logs using SQL Server Management Studio, the query Select * from ::fn_dblog(NULL, NULL) displays the active portion of the transaction log file. Here, assigning NULL values implies?
What is cold boot (hard boot)?
As part of extracting the system data, Jenifer has used the netstat command. What does this tool reveal?
Lynne receives the following email:
Dear lynne@gmail.com! We are sorry to inform you that your ID has been temporarily frozen due to incorrect or missing information saved at 2016/11/10 20:40:24
You have 24 hours to fix this problem or risk to be closed permanently!
To proceed Please Connect >> My Apple ID
Thank You The link to My Apple ID shows http://byggarbetsplatsen.se/backup/signon/
What type of attack is this?
What value of the "Boot Record Signature" is used to indicate that the boot-loader exists?
Korey, a data mining specialist in a knowledge processing firm DataHub.com, reported his CISO that he has lost certain sensitive data stored on his laptop. The CISO wants his forensics investigation team to find if the data loss was accident or intentional. In which of the following category this case will fall?
Which of the following ISO standard defines file systems and protocol for exchanging data between optical disks?
Which of the following Linux command searches through the current processes and lists the process IDs those match the selection criteria to stdout?
In Linux OS, different log files hold different information, which help the investigators to analyze various issues during a security incident. What information can the investigators obtain from the log file
var/log/dmesg?
During an investigation of an XSS attack, the investigator comes across the term “[a-zA-Z0-9\%]+†in analyzed evidence details. What is the expression used for?
Which among the following U.S. laws requires financial institutions—companies that offer consumers financial products or services such as loans, financial or investment advice, or insurance—to protect their customers’ information against security threats?
Joshua is analyzing an MSSQL database for finding the attack evidence and other details, where should he look for the database logs?
Which among the following search warrants allows the first responder to search and seize the victim’s computer components such as hardware, software, storage devices, and documentation?
An investigator has extracted the device descriptor for a 1GB thumb drive that looks like: Disk&Ven_Best_Buy&Prod_Geek_Squad_U3&Rev_6.15. What does the “Geek_Squad†part represent?