ECCouncil 312-49v11 - Computer Hacking Forensic Investigator (CHFIv11)
An investigator is analyzing a suspect's computer in connection with a corporate espionage case. The investigator needs to gather all relevant data from the device, including any provisional information that may provide insights into recent user actions. While investigating, the investigator discovers that the system has stored a variety of data from previous user activities, including text, images, and links that were recently copied. Which type of volatile data is the investigator examining in this situation?
An investigator is reviewing an NTFS file system for evidence of file activity during a cybercrime investigation. The investigator uses The Sleuth Kit’sflsandmactimetools to extract and analyze timestamps related to file actions. These timestamps can provide critical insights into the sequence of events leading up to and during the incident. What kind of file information is the investigator likely focusing on to reconstruct the timeline?
Alex, a system administrator, is tasked with converting an existing EXT2 file system to an EXT3 file system on a Linux machine. The EXT2 file system is currently in use, and Alex needs to enable journaling to convert it to EXT3. Which of the following commands should Alex use to achieve this conversion?
Olivia, a security analyst, is performing a penetration test on a banking website to identify potential vulnerabilities. While reviewing the input fields, she suspects that the site might be vulnerable to SQL injection attacks. During her testing, she observes a URL that seems to have unusual encoding techniques applied to it. One URL stands out, in which the input appears to have been double encoded, potentially to evade detection and bypass filters that prevent SQL injection. Which of the following URLs indicates double encoding to execute an SQL injection attack?
In a financial institution's computer forensic investigation, suspicious activity reveals unauthorized access to GLBA (Gramm-Leach-Bliley Act)-protected customer data, raising concerns for customer safety. However, identifying the breach's source and extent poses significant challenges, complicating compliance with GLBA guidelines.
What steps should be taken in a GLBA-covered computer forensic investigation when unauthorized access to sensitive customer data is discovered?
