Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ECCouncil > CHFI > 312-49v11

312-49v11 Computer Hacking Forensic Investigator (CHFIv11) Question and Answers

Question # 4

During a corporate fraud investigation in Austin, Texas, examiners find that files were erased, logs altered, timestamps manipulated, and content hidden in ways that reduce the quantity and quality of recoverable digital evidence. Which term best describes this class of actions used by perpetrators during cybercrimes?

A.

Brute-force Techniques

B.

Anti-forensics Techniques

C.

Disk Degaussing Techniques

D.

Bypassing Techniques

Full Access
Question # 5

In a prolonged embezzlement investigation at an investment bank in Charlotte, North Carolina, seized ledgers and storage devices move through multiple custodians, including intake personnel, forensic examiners, and auditors. Each transfer must be documented to address potential claims of evidence tampering during testimony. Which documentation element establishes this continuous record of handling and transfer?

A.

Lists individuals involved in evidence handling and their actions

B.

Describes procedures for collecting and storing evidence

C.

Documents the movement of evidence from its origin through examination

D.

Identifies the collector and basic evidence descriptors

Full Access
Question # 6

Emily, a network security analyst, is reviewing the logs generated by a Cisco firewall after a suspected attack on the company ' s network. She encounters a log message related to a connection attempt that seems suspicious. The log shows an entry with mnemonic 106022. Based on the firewall ' s logging patterns, which of the following best describes the log message Emily found?

A.

Deny protocol connection spoof from source_address to dest_address on interface interface_name

B.

ICMP packet type ICMP_type denied by outbound list acl_ID src inside_address dest outside_address

C.

Deny protocol reverse path check from source_address to dest_address on interface interface_name

D.

Deny IP teardrop fragment (size = number, offset = number) from IP_address to IP_address

Full Access
Question # 7

During a file-carving operation at a digital-marketing agency in Atlanta, Georgia, forensic examiners use a utility to inspect binary data in both hexadecimal and ASCII views, enabling them to locate file signatures at specific byte positions such as 0x0000 and recover fragmented image files from unallocated space. Which feature best characterizes this tool used for low-level evidence examination?

A.

Hexadecimal Notation

B.

Hexadecimal area

C.

Hex Editor

D.

Character Area

Full Access
Question # 8

An investigator is reviewing an NTFS file system for evidence of file activity during a cybercrime investigation. The investigator uses The Sleuth Kit’s fls and mactime tools to extract and analyze timestamps related to file actions. These timestamps can provide critical insights into the sequence of events leading up to and during the incident. What kind of file information is the investigator likely focusing on to reconstruct the timeline?

A.

Investigator focuses on the file creation time, last accessed time, and file modification time.

B.

Investigator analyzes the file system ' s internal structure, time-related metadata, and block allocation details for file storage.

C.

Investigator checks the system ' s boot time and shutdown timestamps to understand the system ' s operational periods.

D.

Investigator reviews the timestamps in Windows event logs for any recorded file access or modification times.

Full Access
Question # 9

In a privilege-escalation investigation at a healthcare technology firm in Texas, forensic analysts review Microsoft Azure logging sources to identify who changed administrative role assignments within the organization ' s identity-management environment. Which Azure log source should they examine to obtain this information?

A.

Azure Monitor Logs

B.

Azure Activity Logs

C.

Azure AD Sign-in Logs

D.

Azure AD Audit Logs

Full Access
Question # 10

During a forensic recovery operation at a defense contractor ' s research facility in Denver, Colorado, analysts are restoring corrupted evidence drives from a rack-mounted workstation. The drives require simultaneous bidirectional data transfer and redundancy between multiple controllers to maintain availability if one path fails. Based on these operational requirements, which disk interface would provide the most reliable connection for this environment?

A.

Serial ATA SATA

B.

Peripheral Component Interconnect Express PCIe

C.

Small Computer System Interface SCSI

D.

Serial Attached SCSI SAS

Full Access
Question # 11

A digital forensics team is investigating a case involving the potential tampering of electronic evidence in a cybercrime investigation. In adherence to ENFSI Best Practices for Forensic Examination of Digital Technology , what would be their primary concern?

A.

Analyzing cyberattack origin via IP tracking.

B.

Employing advanced techniques for file recovery.

C.

Determining cybercriminal motive for evidence tampering.

D.

Verifying forensic imaging tools for accuracy.

Full Access
Question # 12

An international organization suffered a significant breach of its database containing sensitive customer data. In the aftermath, the organization decided to hire an external forensic investigator. However, the company ' s board is at odds with the selection criteria for the external investigator. They ' ve asked for your advice. Given the sensitive nature of the breached data and the scale of the attack, what should be a key factor to consider when hiring an external forensic investigator?

A.

Knowledge about the company’s internal systems.

B.

Adherence to professional codes of ethics in forensics.

C.

Experience in dealing with similar cases.

D.

Reputation in the industry.

Full Access
Question # 13

A company is conducting a large-scale eDiscovery process to gather, process, and produce data relevant to an ongoing investigation. The legal and IT teams are tasked with monitoring the progress of these stages to ensure data integrity and accuracy. They also need to manage the associated costs effectively throughout the process. Given the complexity and scale of the eDiscovery process, proper tracking is essential. Which aspect should the company prioritize to achieve these objectives?

A.

Define key performance indicators (KPIs) and measure the volume of information at every stage of the eDiscovery process.

B.

Implement a centralized data repository to streamline access and management of the gathered electronic evidence.

C.

Establish a cross-functional team to oversee the coordination between legal and IT departments during the eDiscovery process.

D.

Develop a comprehensive training program for staff involved in the eDiscovery process.

Full Access
Question # 14

During a high-profile fraud case in New York City, investigators receive an iPhone that repeatedly fails to complete a restore in its standard recovery mode. To proceed with a lower-level restore state that allows reloading firmware even when the normal recovery process is unsuccessful, which option should the team use?

A.

SecureROM

B.

Recovery mode

C.

iBoot

D.

Device Firmware Update DFU mode

Full Access
Question # 15

Elena, a forensic investigator, is analyzing the behavior of a suspected malware infection. During her analysis, she notices several abnormal entries in the Windows Event Logs, specifically Event ID 5156 . What key information can Elena expect from these logs that could help her trace the malicious activity?

A.

The username and password used for unauthorized access

B.

The location of the file that was deleted by the malware

C.

The malicious process ' s registry key modification details

D.

The name of the process and the IP address it communicated with

Full Access
Question # 16

An investigator is working on a digital forensics case involving a suspected data breach. The investigator is tasked with acquiring data from the suspect ' s hard drive. Before beginning the data extraction process, the investigator securely removes all sensitive data from the drive. To ensure that no residual data can be recovered from the drive, the investigator applies a method to overwrite the data on the drive using a series of sequential zeros and ones, thereby protecting the privacy and integrity of the investigation. Which forensic data acquisition step is the investigator performing?

A.

Validating data acquisition to ensure complete and accurate data collection.

B.

Acquiring volatile data to capture temporary, live data from the system.

C.

Planning for contingency to ensure backup procedures are in place in case of failure.

D.

Sanitize the target media to make the content unrecoverable.

Full Access
Question # 17

A cybersecurity analyst named John is working in an organization that has been facing recurring attacks. John noticed some unusual behavior on one of the servers running the Windows operating system. The server was repeatedly making attempts to connect to a random IP address. Upon inspection, he found that the built-in admin account had been compromised and was being used to make these connections. He then decided to use pwdump7 to extract the hashes from the system, but he couldn ' t decipher what kind of hash was extracted. The hash was " 8846f7eaee8fb117ad06bdd830b7586c " . Which of the following password-cracking tools is best suited to crack this hash?

A.

Hashcat

B.

John the Ripper

C.

RainbowCrack

D.

L0phtCrack

Full Access
Question # 18

During a burst of database errors and high time-taken values at a media site in San Diego, California, users report in-browser pop-ups tied to URL-appended input. Investigators pivot to the Apache access logs and need the field that exposes the exact request line so they can compare the payload content against those spikes. What Apache log directive captures the method, path with query string, and protocol in the combined and common log formats?

A.

%r

B.

%{Referer}i

C.

%h

D.

%u

Full Access
Question # 19

An investigator is assigned to review dark web chat room communications as part of an ongoing cybercrime investigation. The chat logs span several weeks, consisting of a vast number of conversations filled with obscured language, coded references, and misleading statements designed to evade detection. Sifting through this extensive volume of messages to extract meaningful intelligence becomes an incredibly time-consuming and labor-intensive task, requiring advanced analysis tools and a systematic approach to filter out the noise and focus on the crucial details. Which dark web forensics challenge does this scenario highlight?

A.

The legal challenges in gathering evidence from global, anonymous platforms like the dark web

B.

The difficulty in distinguishing between genuine and deceptive chat room communications.

C.

The challenge of correlating chat room communications with real-world identities.

D.

The challenge of processing extensive chat room communications that contain obfuscated content.

Full Access
Question # 20

Sophia, a forensic investigator, is analyzing a file suspected to be an image. She is examining the file’s hexadecimal signature to identify its format. Upon inspection, she notices that the first three bytes of the file are 47 49 46 in hexadecimal. Based on this information, which of the following image formats is the file most likely to be?

A.

PNG

B.

BMP

C.

GIF

D.

JPEG

Full Access
Question # 21

Megan, a CHFI investigator, is examining a complicated breach at a cutting-edge IoT technology company that designs systems for smart homes. The company ' s IoT devices have experienced a massive scale breach, with numerous devices sending unauthorized data to an external server. The company uses a public cloudbased model to manage IoT devices. The unique problem Megan faces is that the breach did not occur via the traditional IoT vulnerabilities as the devices have been designed with state-of-the-art security features and yet the attacker has managed to bypass all security measures. Which of the following is the most plausible method the attacker could have used to compromise the IoT devices?

A.

Used a botnet to flood the network with traffic

B.

Exploited weak encryption protocols in the company ' s IoT devices

C.

Hacked into the TOR Bridge Node used by the company

D.

Manipulated the Cloud API to gain unauthorized access

Full Access
Question # 22

A forensic investigator is performing an eDiscovery process within an organization, following the EDRM framework. The investigator focuses on narrowing down the volume of electronically stored information (ESI) by eliminating unnecessary data and converting it into a more manageable format that can be easily analyzed or examined. The investigator is ensuring that the data is prepared appropriately for the next phase in eDiscovery. Which EDRM stage is the investigator executing in the above scenario?

A.

The investigator is performing the analysis phase to interpret the data’s significance.

B.

The investigator is executing the production phase to finalize the data for legal use.

C.

The investigator is conducting the review phase to assess the data.

D.

The investigator is handling the processing phase to streamline the data for easier handling.

Full Access
Question # 23

During a routine digital investigation, forensic analysts suspect that sensitive information may be hidden within seemingly innocuous files. Despite extensive scanning and analysis, they are unable to detect any abnormalities using conventional surveillance techniques.

What technique might attackers use to hide sensitive information within seemingly normal files, making it difficult for forensic investigators to detect?

A.

Trial obfuscation

B.

Hiding data in file system structures

C.

File extension mismatch

D.

Steganography

Full Access
Question # 24

Michael, a forensic examiner, is conducting a forensic analysis of an image file obtained from a suspect ' s machine. While examining the file using a hex editor, he discovers that the hex value of the file starts with the sequence " 89 50 4c. " The file appears to be suspicious, so Michael needs to identify the type of the file to understand its structure and determine whether it contains any malicious content. Given this information, what type of file is Michael looking at?

A.

BMP

B.

JPEG

C.

PDF

D.

PNC

Full Access
Question # 25

Jenny, a CHFI specialist, is assigned to a case involving potential corporate fraud within a major banking institution. A whistleblower from the bank has leaked terabytes of data online, which Jenny must examine for evidence. The sheer volume of the data, combined with the requirement to maintain the chain of custody and ensure that her findings can be used in court, makes her task quite daunting. Jenny knows that using the wrong approach could jeopardize the case, so she must choose her initial steps carefully. What should Jenny ' s strategy be to effectively deal with this mountain of digital evidence?

A.

Start examining the leaked data directly from the source of the leak

B.

Prioritize the leaked data based on the whistleblower ' s information, and conduct a selective examination

C.

Create hash values for all leaked files before the examination to maintain data integrity and chain of custody

D.

Download the leaked data and distribute it among her team for parallel analysis

Full Access
Question # 26

As a cybersecurity analyst, recently, you detected an unusual increase in network traffic originating from multiple endpoints within the organization’s network. Upon further investigation, you discovered that several employees received phishing emails containing seemingly innocuous attachments. However, these attachments are suspected to be part of a GootLoader campaign, a notorious malware distribution method. What could be concluded for the attachments?

A.

The attachments might be serving as the first-stage payload in a GootLoader campaign.

B.

The attachments could be exploiting zero-day vulnerabilities to gain unauthorized access to the network.

C.

The attachments may contain spyware designed to steal confidential information from the organization.

D.

The attachments may contain ransomware capable of encrypting sensitive data.

Full Access
Question # 27

A forensic investigator is assigned to investigate a data leak involving the distribution of sensitive corporate information across multiple online platforms. The suspect is believed to have shared the data discreetly through various public channels. To uncover evidence, the investigator needs to collect posts, photos, videos, and user interactions from multiple networks. The investigator requires a tool that can efficiently gather, organize, and analyze this data, ensuring the integrity of the evidence for further investigation. Which tool would be best suited for this task?

A.

LiME

B.

Elastic Stack

C.

Social Network Harvester

D.

Guymager

Full Access
Question # 28

During a securities-fraud litigation in New York, a corporation initiates an eDiscovery program. Before any data collection begins, the team must define the scenarios for evidence gathering, including what will be collected, where it resides, and how it will be preserved, to ensure admissibility and compliance. Which role is responsible for this task?

A.

IT Support Personnel

B.

Team Leads

C.

Legal Expert or eDiscovery Attorney

D.

Project Manager

Full Access
Question # 29

During a cyber espionage investigation at a defense contractor in Washington, D.C., forensic analysts used shared intelligence feeds to pinpoint unusual network beacons matching known adversary tactics, enabling them to trace the intrusion back to specific command-and-control servers and validate the scope of data exfiltration. Which role of threat intelligence in computer forensics is primarily demonstrated in this scenario?

A.

Identifies the threats at the early stage

B.

Discovers the indicators of compromise for further investigation

C.

Provides appropriate guidance throughout the forensic investigation process

D.

Recognizes and correlates the known attack patterns

Full Access
Question # 30

A well-known e-commerce company is under investigation after a series of suspicious activities reported by multiple users. One user reported unauthorized purchases, and another reported changes in personal details. The company ' s internal security team discovered that some sessions were overlapping, hinting that more than one user was using the same session at different geographical locations. The team concluded that the session cookies must have been intercepted and used by an attacker. As a forensic investigator, what type of attack is the most probable cause for this security incident?

A.

Cross-Site Scripting (XSS) attack.

B.

Brute Force attack.

C.

SQL Injection attack.

D.

Parameter Tampering attack.

Full Access
Question # 31

A medium-sized company ' s IT department noticed a sudden surge in network traffic and peculiar DNS requests originating from their internal servers. Realizing it could be a malware attack, they recruited Lisa, a seasoned forensic investigator, to probe into the situation. Lisa decided to use a tool to analyze this unusual network behavior and particularly focus on monitoring DNS requests. What tool should Lisa use for this?

A.

Wireshark

B.

Nmap

C.

Snort

D.

Nessus

Full Access
Question # 32

During a malware investigation at a financial institution in New York, forensic investigators executed a suspicious file on a Windows forensic workstation. Using the netstat -an command, they discovered that port 1177 had been opened and was actively connected. The investigators now need to determine whether the observed port activity is associated with legitimate services or indicative of malicious behavior. How should investigators evaluate the significance of this port activity?

A.

Review the list for any suspicious port number that is opened on the workstation

B.

Refer to online port databases

C.

Execute the suspect file on the forensic workstation

D.

Display all active TCP/IP connections along with a list of active ports using netstat -an

Full Access
Question # 33

A digital forensic investigator is tasked with analyzing an NTFS image file extracted from a pen drive. They leverage The Sleuth Kit (TSK) for this task, specifically utilizing the fsstat command-line tool. By employing fsstat, they delve into the file system’s intricate details, such as metadata, inode numbers, and block or cluster information, thereby facilitating a comprehensive examination.

How can an investigator use TSK to analyze disk images?

A.

By performing network scans

B.

By conducting manual inspections

C.

By using the plug-in framework

D.

By writing custom code

Full Access
Question # 34

An organization has successfully defined its eDiscovery strategy, focusing on managing data collection efficiently for a legal investigation. As part of this strategy, the legal team is tasked with ensuring that only the relevant data is gathered from the appropriate sources. The legal team is responsible for identifying the data sources that contain electronically stored information (ESI) necessary for the investigation. Which best practice for eDiscovery is the legal team following in this case?

A.

Map the data to identify custodians and determine the location of the data for collection.

B.

Rely on self-collection by custodians without providing clear guidelines.

C.

Use directed collection to obtain all available data from custodians, including irrelevant files.

D.

Collect data only from one source to minimize collection time and resources.

Full Access
Question # 35

James is a seasoned digital forensic investigator at an international law firm dealing with a convoluted case of industrial espionage. The attacker, believed to be a disgruntled former employee, allegedly used a sophisticated network of compromised internal and external systems to steal sensitive data. Multiple jurisdictions and regulations are involved, with systems located in various countries. The firm’s legal team is concerned about the rules of evidence and obtaining the necessary warrants for search and seizure across different legal systems. To make matters more complex, some of the firm’s clients are refusing to give consent for James to access and investigate their systems, further complicating the evidence-gathering process. What should James ' s initial approach be in such a complex scenario?

A.

Limit the investigation to the firm ' s internal systems to avoid legal complications

B.

Forego the search warrants and start the investigation based on available data

C.

Proceed to access the clients ' systems covertly, as the firm owns the data

D.

Work with the legal team to understand and respect each jurisdiction ' s laws and seek necessary warrants

Full Access
Question # 36

In a smart city surveillance breach at a municipal agency in Chicago, Illinois, investigators identify anomalous data flows from field sensors to cloud services, where intermediate processing for data aggregation, data filtering, access control, and device information discovery would reveal policy violations. Which IoT architecture layer, acting as an interface between hardware and applications, should be the focus?

A.

Edge Technology Layer

B.

Middleware Layer

C.

Application Layer

D.

Access Gateway Layer

Full Access
Question # 37

Sophia, a cybersecurity analyst, is investigating a data breach within a company. The breach is suspected to have come from an insider, as sensitive company data was altered from within the company’s network. Sophia needs to determine whether the breach was caused by an insider (someone within the company) or an external attacker (someone from outside the company).

Which of the following factors would most likely indicate that the breach was carried out by an insider?

A.

The attack used advanced social engineering tactics to exploit external vulnerabilities.

B.

The attack was launched from a known external IP address associated with a hacker group.

C.

The attacker used a distributed denial-of-service (DDoS) attack to overwhelm the network.

D.

The attacker had legitimate access to the company’s internal systems and data.

Full Access
Question # 38

A digital forensics examiner is investigating a suspected case of corporate espionage involving the theft of sensitive intellectual property from a company ' s servers. In adherence to ENFSI Best Practices for Forensic Examination of Digital Technology,

what would be the examiner ' s primary concern?

A.

Complying with GDPR data privacy rules.

B.

Following ISO/IEC 17025 standards in forensic labs.

C.

Establishing secure evidence-handling protocols.

D.

Implementing ISO/IEC 27001 for information security.

Full Access
Question # 39

In a supply chain attack investigation at an automotive supplier in Detroit, Michigan, the forensics team examines alerts from endpoint antivirus systems indicating suspicious file downloads and network IDS sensors reporting anomalous outbound DNS queries. Independently, the alerts provide limited insight. The team consolidates these sources to identify relationships and reconstruct the broader compromise sequence. What event-correlation approach does this consolidation demonstrate?

A.

Route Correlation

B.

Cross-domain Event Correlation

C.

Multivariate Correlation

D.

Topology-based Event Correlation

Full Access
Question # 40

While examining a banking Trojan incident in Chicago, forensic analysts execute a suspicious sample within a controlled analysis environment. The program immediately terminates and alters its execution flow under these conditions, preventing analysts from observing its intended behaviour. What aspect of malware analysis is reflected by this behavior?

A.

Use of techniques such as encryption, code obfuscation, and artifact removal

B.

Detection of analysis environments and modification of execution behavior

C.

Ensuring accurate and consistent analysis results

D.

Identifying malware components and behavioral traits

Full Access
Question # 41

A cybersecurity incident at a Boston-based healthcare provider forced the response team into action. They quickly assigned roles, prioritized critical systems for protection, notified executives, and began containing the threat. After removing the malicious code, they restored affected services and later conducted a lessons-learned review. Which structured approach best describes the complete method they are following?

A.

Overview of Incident Response Process Flow

B.

Preparation for IR

C.

Post-Incident Activities

D.

Eradication

Full Access
Question # 42

During a cybersecurity investigation involving a data breach at a financial institution, an investigator is tasked with identifying the root cause of the breach and generating a timeline of events that led to the incident. The investigator needs to determine which step in the forensic process will help uncover the sequence of activities, including the vulnerabilities exploited, the time of attack, and the specific actions taken by the attacker. Which of the following forensic techniques is most effective for achieving this goal?

A.

Data duplication

B.

Photographing the crime scene

C.

Data analysis

D.

Data acquisition

Full Access
Question # 43

During an incident-response project at a biotech company in San Diego, California, the team must move 600 TB of research datasets from an isolated lab network to Google Cloud, but the site has limited bandwidth and no direct peering. They need a secure, offline method to ship the data to Google for upload into Cloud Storage. Which Google Cloud service fits this requirement?

A.

Data Transfer Services

B.

Transfer Appliance

C.

Cloud Storage for Firebase

D.

Google Cloud Backup and DR

Full Access
Question # 44

As part of a corporate policy-violation inquiry at a creative agency in New York City, an examiner reviews artifacts within a user ' s ~/Library/Preferences/ directory to correlate activity surrounding suspicious file transfers. The examiner needs a user-specific plist that records application usage relevant to the time window under review. What artifact best supports this analysis?

A.

Application Support/

B.

com.apple.recentitems.plist

C.

com.apple.desktop.plist

D.

com.apple.dock.plist

Full Access
Question # 45

During a forensic investigation into suspicious activities within an organization ' s AWS environment, the investigator uses Amazon CloudWatch to adjust the storage duration of specific log data sets. This action is crucial for managing the lifespan of logs and ensuring that critical logs are preserved for further analysis during the investigation. Which feature of Amazon CloudWatch is the investigator using in this scenario?

A.

Analyzes and monitors systems and applications through the log data.

B.

Searches and analyzes log data efficiently using CloudWatch Logs Insights.

C.

Modifies retention policies for individual log groups.

D.

Sets notification alerts for specific API activities for further investigation and troubleshooting.

Full Access
Question # 46

During a cloud migration at a financial firm in Charlotte, North Carolina, investigators evaluate Google Cloud storage options for a mission-critical SQL Server workload that must support scaling out analytics while providing high performance with strong data persistence and management capabilities. Which Google Cloud data storage service best aligns with these requirements?

A.

Local SSD

B.

Persistent disk

C.

Hyperdisk

Full Access
Question # 47

During a forensic investigation in Chicago, Illinois, analysts attempt to recover image fragments from unallocated disk space. One fragment begins with the hexadecimal sequence FF D8 FF E0 and ends with FF D9, while another begins with 42 4D followed by header data specifying dimensions and color depth. Based on these file signatures, which image file format does the first fragment represent?

A.

PNG

B.

BMP

C.

JPEG

D.

GIF

Full Access
Question # 48

In a multinational corporation, there have been increasing reports of system crashes and data leaks from the intranet. Forensic investigators discovered a highly polymorphic worm propagating across the network. The worm quickly changes its structure, making it difficult to analyze its behavior and create signatures. Susan, a cybersecurity analyst, needs to conduct a behavioral analysis of the worm in a secure and controlled environment. Which of the following tools should she use for this purpose?

A.

Wireshark

B.

Cuckoo Sandbox

C.

IDA Pro

D.

Process Monitor

Full Access
Question # 49

A cybersecurity analyst is tasked with investigating a series of network anomalies. They employ various event correlation approaches, including graph-based analysis to map system dependencies and neural network-based anomaly detection. Through rule-based correlation and vulnerability-based mapping, they pinpoint potential threats and prioritize response actions effectively.

Which event correlation approach involves constructing a graph with system components as nodes and their dependencies as edges?

A.

Rule-Based Approach

B.

Codebook-Based Approach

C.

Neural Network-Based Approach

D.

Graph-Based Approach

Full Access
Question # 50

In a corporate environment, a senior executive ' s Android smartphone is secured for internal forensic review following indicators of unauthorized data access. The inquiry is administrative in nature, and the executive remains available to assist with the investigation. The device is protected by a passcode, preventing immediate access to potential evidence. Investigators are required to obtain access without altering existing data or invoking escalated technical measures. To proceed lawfully while preserving evidential integrity, which approach is most appropriate?

A.

Seek employee’s cooperation for voluntary passcode disclosure, ensuring lawful data access without compromising investigation integrity.

B.

Utilize Android-specific forensic software for a compliant brute-force passcode attack, systematically guessing combinations to access data while adhering to legal and ethical standards.

C.

Use remote MDM software to reset device passcode, enabling data access while maintaining evidence integrity.

D.

Request management approval for physical device acquisition using specialized tools, ensuring data access without compromising evidence integrity.

Full Access
Question # 51

During a targeted phishing follow-up at a financial firm in New York, forensic analysts parse a compromised endpoint ' s raw Event Log File Format records to validate a timeline. They need to differentiate per-event timestamps from overall file-level status flags to see whether late writes occurred around shutdown. In this format, which component provides the per-event timestamps needed for that comparison?

A.

EVENTLOGRECORD structure

B.

ELF_LOGFILE_HEADER_WRAP

C.

ELF_LOGFILE_HEADER structure

Full Access
Question # 52

As part of a coordinated ransomware investigation at a financial institution in Boston, Massachusetts, analysts review alerts generated by multiple compromised endpoints. The investigation requires grouping related events and correlating them over time to uncover recurring indicators and links between distributed attack activity. What event-correlation approach supports this method of analysis?

A.

Neural Network-based Approach

B.

Field-based Approach

C.

Graph-based Approach

D.

Codebook-based Approach

Full Access
Question # 53

At a regional bank in Charlotte, North Carolina, investigators are processing a full packet capture obtained from a firewall span port during a suspected intrusion incident. The capture contains mixed inbound and outbound connections, and the team needs to apply community-maintained detection rules to the traffic to flag packets that match known exploit signatures or anomalous protocols before conducting manual analysis. Which tool should be selected for this processing step?

A.

HTTPS Logs Viewer

B.

HttpLogBrowser

C.

Snort IDS

D.

Sumo Logic IIS Log Analyzer

Full Access
Question # 54

An organization investigates a series of cyberattacks that seem to originate from a prominent hacker collective. The attacks appear highly coordinated and use advanced malware, with command-and-control infrastructure resembling that of an organization with a specific geopolitical agenda. However, investigators suspect the attackers might be using tools to mimic the collective ' s established tactics and obscure their true identity. Which attribution challenge is the organization most likely facing?

A.

The attackers using false-flag methods to impersonate those of a known group.

B.

The inability to access technical indicators such as malware signatures or command-and-control infrastructure.

C.

The lack of cooperation from the attacker’s country, making it difficult to investigate cross-border activities.

D.

The difficulty in identifying geopolitical motivations behind the attacks

Full Access
Question # 55

In a complex cybersecurity landscape, analysts strategically deploy Kippo honeypots , leveraging these deceptive systems to entice and ensnare potential attackers. These sophisticated decoys are meticulously designed to mimic genuine network assets, creating an illusion of vulnerability to bait adversaries. As attackers interact with the honeypots, their actions are meticulously logged, providing invaluable insights into their methodologies, tactics, and tools. Analysts diligently analyze these honeypot logs, decoding the intricate patterns of malicious behavior, and leveraging this intelligence to fortify the organization ' s defenses against real-world cyber threats.

Amidst the dynamic cybersecurity environment, what is the paramount objective of analyzing honeypot logs in cybersecurity operations?

A.

To meticulously identify, track, and understand the methodologies and strategies employed by attackers infiltrating the network.

B.

To monitor and evaluate the performance of the organization ' s security systems, optimizing defense mechanisms against cyber threats.

C.

To generate comprehensive compliance reports, ensuring adherence to regulatory standards and frameworks.

D.

To discern potential vulnerabilities within the organization ' s network infrastructure, facilitating proactive risk mitigation strategies.

Full Access
Question # 56

Following a forensics investigation, an organization is focused on implementing a comprehensive set of policies and procedures to effectively safeguard electronic data across its systems and networks. These policies are designed to ensure compliance with applicable legal, regulatory, and operational standards while also safeguarding the integrity of the data for future audits, investigations, or legal proceedings. This stage aims to establish clear guidelines for data retention, management of access, and long-term preservation. Which stage of the Electronic Discovery Reference Model (EDRM) cycle does this activity correspond to?

A.

Disposal of unnecessary data after it is no longer required for legal or regulatory purposes.

B.

Information governance involving the creation of data control mechanisms.

C.

Collection of data from identified sources for subsequent analysis.

D.

Identification of data to ensure it is relevant and available for review.

Full Access
Question # 57

Following a data breach, suspicion falls on an employee who had access to sensitive information. Insider threat tools are deployed to scrutinize the employee ' s digital activities and flag any anomalous behavior, aiding both the investigation and the prevention of future breaches.

How do insider threat tools contribute to cybersecurity in the given scenario?

A.

By monitoring and detecting suspicious behavior within the organization

B.

By analyzing competitor strategies

C.

By predicting market trends

D.

By enhancing social media presence

Full Access
Question # 58

During a cybercrime investigation, the forensic team has seized a large number of devices as part of the evidence collection process. After securing all the devices, the team begins evaluating which exhibits to prioritize for analysis first. The team maintains detailed records of both analyzed and non-analyzed exhibits, ensuring that they can track the progress of the investigation and reference any exhibits that were not immediately analyzed.

Which ENFSI best practice is being followed by the team?

A.

The team conducts an initial case evaluation to assess the case’s requirements.

B.

The team performs a scene assessment to handle evidence at the crime scene.

C.

The team carries out a laboratory assessment to document artifacts.

D.

The team executes the acquisition of data to extract data from the seized devices.

Full Access
Question # 59

During an investigation of a high-profile cybercrime case, a law enforcement agency realized the need for specialized computer forensic investigators. Their general forensic investigators were struggling with the specific demands of computer forensics. Although they considered hiring external forensic investigators, they decided against it due to budget constraints. What could be a potential solution to this predicament?

A.

Training their current investigators in computer forensics.

B.

Outsourcing the investigations to a private firm.

C.

Investing in advanced forensic tools to assist their current investigators.

D.

Collaborating with international law enforcement agencies for assistance.

Full Access
Question # 60

You are a cybersecurity analyst tasked with performing dynamic malware analysis on a suspicious file received by your organization. Your objective is to understand the behavior of the malware by running it in a controlled environment and monitoring its actions without allowing it to propagate to the production network. As a cybersecurity analyst conducting dynamic malware analysis, what is a key aspect of designing the testing environment to ensure the safety of the production network?

A.

Implementing host integrity monitoring to track system changes caused by the malware.

B.

Disabling antivirus software to prevent interference with the malware ' s execution.

C.

Running the malware on physical machines to minimize the risk of network propagation.

D.

Using outdated operating systems to reduce compatibility issues with the malware.

Full Access
Question # 61

A forensic investigator is examining a system that has experienced a failure during booting. The investigator discovers that the boot process was interrupted after the BIOS had initialized the system hardware . What is the next step in the boot process that would have occurred had it not failed?

A.

The boot manager would locate the bootable partition and load the MBR.

B.

The kernel would start and load the system ' s hardware abstraction layer (HAL).

C.

The system would load the ntoskrnl.exe file from the boot partition.

D.

The bootloader would load the operating system’s kernel.

Full Access
Question # 62

A large financial institution experiences a ransomware attack that encrypts critical data, disrupting operations and requiring immediate evidence collection for legal action. The organization ' s pre-established policies allow for quick identification of digital evidence, collaboration with external experts, and minimal downtime by integrating evidence gathering with backup restoration processes. This preparation ensures that forensic activities do not further hinder business recovery, enabling the company to resume services while preserving evidence integrity. What key concept is demonstrated in this scenario that helps balance investigation needs with operations?

A.

Training and awareness

B.

Data backups and integrity

C.

Incident Response Integration

D.

Testing and drills

Full Access
Question # 63

As a Computer Hacking Forensic Investigator, you ' re working on a case involving the unauthorized alteration of financial records within a major bank. The network administrators have identified a specific terminal where they believe the alterations originated. You have been tasked with examining this workstation. The administrators inform you that the machine has been powered down for fear of further alterations. In this scenario, which of the following would be your first step?

A.

Power up the machine and perform a live analysis to identify any running processes that might have been involved in the unauthorized alterations.

B.

Connect the machine to a separate network and use a network packet analyzer to monitor any ongoing traffic.

C.

Leave the system powered down, and initiate the forensic imaging process for further offline analysis.

D.

Create a bootable copy of the hard drive to analyze on a separate, secure machine

Full Access
Question # 64

During a late-night incident at an e-commerce site in Houston, Texas, analysts see bursts of database errors and long time-taken values in IIS logs that coincide with requests where attackers reportedly appended encoded input to the URL. To isolate and compare the exact payload strings against these spikes, which IIS W3C field should investigators parse?

A.

sc-status

B.

cs-method

C.

cs-uri-stem

D.

cs-uri-query

Full Access
Question # 65

Emily, a cyber forensic investigator, has been called upon to investigate a case involving smartphone evidence. The primary devices are an Android and an iOS phone. Emily decides to perform a logical acquisition on both devices to gather evidence. From the given choices, which tool should she use that can provide a thorough logical acquisition of both Android and iOS devices?

A.

ADB (Android Debug Bridge)

B.

UFED Cellebrite

C.

FTK Imager

D.

iPhone Backup Extractor

Full Access
Question # 66

An investigator is reviewing the Apache access logs for suspicious traffic. She notices a series of requests for /admin.php from an IP address that is not normally associated with administrative access. What should she do next to determine whether this is an unauthorized access attempt?

A.

Cross-reference the IP address with the server’s DNS logs to see if it is part of a known network.

B.

Analyze the user-agent strings associated with the requests to identify the browser being used.

C.

Check the HTTP status codes in the log entries for these requests to identify whether they were successful.

D.

Review the timestamps of the requests to determine if they occurred during business hours.

Full Access
Question # 67

During an after-hours breach at a Boston data center, an on-duty responder is concerned about preserving in-memory runtime information such as active process state, session data, and encryption material for later analysis. Which action would most jeopardize preservation of this information?

A.

Not having access to baseline documentation about the victim computer

B.

Shutting down or rebooting the victim computer; in this case, all volatile data are lost

C.

Failing to document the data-collection process

D.

Assuming that some components of the victim computer may be reliable and usable

Full Access
Question # 68

As the senior forensic analyst for an international software development firm, you’re tasked with handling an ongoing investigation into suspected insider threats. Several project files have been reported as missing from the company’s secured servers. In one instance, a junior team member reported receiving an email, seemingly from his manager, instructing him to move specific files to a shared network location. After complying, the files disappeared. As part of your investigation, you have acquired disk images of all systems involved. What should be your next step?

A.

Perform an immediate analysis of the disk images, focusing on identifying and extracting any potential malware for analysis.

B.

Interview the team member who moved the files to determine if they had any role in the data loss.

C.

Prioritize the retrieval of deleted files from the disk images and scrutinize any software or processes that may have led to their deletion.

D.

Conduct a detailed analysis of the email headers and server logs to identify the origin of the deceptive email.

Full Access
Question # 69

Kaysen, a forensic investigator, was examining a compromised Windows machine. During the investigation, Kaysen needs to collect crucial information about the applications and services running on the machine to understand the impact of the breach. The investigator must gather real-time volatile evidence, such as active processes and running services, while ensuring that the data collection does not interfere with or alter the system’s state. Which of the following tools will help Kaysen in the above scenario?

A.

ExifTool

B.

Wireshark

C.

tasklist

D.

Hexinator

Full Access
Question # 70

A large multinational corporation, specializing in financial services, recently experienced a potential data breach that affected their critical business systems. As part of the forensic investigation, the organization must quickly restore its servers, both fully and at a granular level, to determine the extent of the breach and verify the integrity of sensitive financial data. The forensic team needs a comprehensive and reliable tool that can perform full image-level backups of their servers, as well as allow for selective file and folder restores in order to investigate individual systems and recover specific documents and configuration files. The tool should be able to handle both physical and virtual environments efficiently, ensuring minimal downtime and accurate data recovery.

Given the organization ' s need for rapid and reliable recovery, the forensic team must choose a tool that can restore entire systems in case of failure while also offering the flexibility to restore individual files or folders from the backup image. This capability is critical for isolating the compromised systems and recovering vital business records that may have been affected by the breach. The organization requires a solution that not only restores data but also provides the ability to maintain business continuity during the investigation, ensuring that systems are up and running as quickly as possible while maintaining forensic integrity.

Which of the following forensic tools would be best suited for this task?

A.

Snagit

B.

Macrium Reflect Server

C.

VMware vSphere Hypervisor

D.

Ezvid

Full Access
Question # 71

During a forensic investigation, the investigator needs to collect data from a suspect ' s smartphone. The investigator is aware of the need to follow proper procedures to ensure the data is admissible in court. The investigator must also take into account legal and ethical issues, particularly when handling mobile devices that may contain personal and sensitive information. What should the investigator do to ensure compliance with legal requirements while collecting data from the mobile device?

A.

Obtain permission from the device owner and ensure that the evidence gathering process complies with applicable regulations.

B.

Disconnect the device from the internet to avoid any external interference during data collection, but do not document this action.

C.

Use any available forensic tool without checking for compatibility or regulatory compliance.

D.

Collect data from the mobile device without documenting the process, as it will speed up the investigation.

Full Access
Question # 72

A system administrator is configuring a new storage array for a critical application and selects a RAID level that uses data stripping and dedicated parity. The RAID setup requires a minimum of three disks, and it ensures data is striped at the byte level across multiple drives, with one drive set aside to store the parity information for fault tolerance. After configuring the RAID system, the administrator tests its ability to tolerate a single drive failure and confirms the system can still function without data loss. Which RAID level is the system administrator using in this scenario?

A.

RAID 1

B.

RAID 3

C.

RAID 10

D.

RAID 0

Full Access
Question # 73

Amelia, a cloud security analyst, is investigating a security breach in a cloud-based system where an adversary has managed to execute malicious code within the cloud environment. The attack was executed by intercepting and manipulating a SOAP message during transmission, duplicating the body of the message, and sending it to the server as though it was from a legitimate user. This manipulation resulted in the adversary gaining unauthorized access to the cloud system. What type of cloud-based attack did the adversary perform in this situation?

A.

Domain sniffing

B.

Cybersquatting

C.

Domain hijacking

D.

Wrapping attack

Full Access
Question # 74

During a forensic investigation into a recent security incident within an organization, the investigator is tasked with documenting every action taken with the evidence to ensure proper chain of custody. The investigator carefully documents every action taken with the evidence in a logbook. The evidence is tagged with unique identifiers to prevent confusion. A detailed chain of custody record is also created to track the evidence ' s movement and handling throughout the investigation. Which investigation step is the investigator performing in this scenario?

A.

The investigator is preserving the evidence collected from the incident site.

B.

The investigator is performing scoping on the location where the security incident took place.

C.

The investigator is carrying out data analysis on the evidence for potential findings related to the breach.

D.

The investigator is conducting a search and seizure of the evidence related to the security incident.

Full Access
Question # 75

Sarah, a forensic investigator, is conducting a post-compromise investigation on a company’s server that contains sensitive data. To ensure the deleted files do not fall into the wrong hands, she follows a media sanitization procedure . The process involves overwriting the deleted data 6 times with alternating sequences of 0x00 and 0xFF, followed by a final overwrite using the pattern 0xAA .

Which of the following media sanitization standards has Sarah followed in this scenario?

A.

NAVSO P-5239-26 (MFM)

B.

GOST P50739-95

C.

VSITR

D.

DoD 5220.22-M

Full Access
Question # 76

During a data-exfiltration case at a Seattle design firm, investigators need the macOS encrypted container that securely stores user account names and passwords for Mac, apps, servers, and websites and can also hold confidential information such as credit card numbers or bank PIN numbers. What Mac forensics data source should they examine?

A.

Apple Mail

B.

Time Machine

C.

Property list or plist files

D.

Keychain

Full Access
Question # 77

Alice decides to make a purchase on a popular e-commerce website. After adding items to her cart and proceeding to checkout, she notices that she is already logged into her account, thanks to the “Remember Me” feature enabled by the website. However, Alice becomes concerned when she realizes that her friend had previously warned her about the risks of cookie poisoning attacks.

Which of the following actions is most advisable for Alice to take next?

A.

Clear cookies, log out, proceed with caution.

B.

Implement MFA for cookie protection.

C.

Create new account to avoid cookie risks.

D.

Proceed with VPN and privacy extension, assuming safety.

Full Access
Question # 78

During call setup, a telecommunications service provider employs a multifaceted approach to verify the identity of both the calling and called parties, ensuring the legitimacy of the users involved. Sarah, a security analyst at the provider, oversees the process, utilizing a combination of unique identifiers to obtain subscriber information and perform location tracking.

Which specific mechanism stands out as the primary means for the service provider to ensure user identity during call setup?

A.

By analyzing the duration of the call.

B.

By tracking the location of the caller only.

C.

By monitoring the content of the call.

D.

By utilizing IMSI and IMEI information.

Full Access
Question # 79

Emma, a seasoned forensic investigator, is assigned to a case involving a mobile device suspected of being used in a criminal activity. The device is an Android smartphone, and Emma needs to extract comprehensive data for analysis. She needs to recover both the existing and deleted data, including system-level files, that could help provide evidence for the investigation. Which of the following acquisition methods would allow Emma to access the most extensive data from the device?

A.

Cloud data acquisition

B.

File system acquisition

C.

Logical acquisition

D.

Physical acquisition

Full Access
Question # 80

During a preliminary scan at a financial services firm in New York City, a suspicious binary exhibits unusually high entropy and yields almost no readable strings, suggesting concealment tactics that evade basic signatures without execution. To uncover these evasion layers in the file ' s structure prior to any runtime testing, which static analysis technique should the team prioritize to reveal the transformation methods applied to the sample?

A.

Local and online malware scanning

B.

File fingerprinting

C.

Performing strings search

D.

Identifying packing or obfuscation methods

Full Access
Question # 81

During a forensic investigation, the team is responsible for ensuring that the forensic laboratory remains secure. As part of the security protocols, the lab has implemented a system to record all visitors, including details such as name, address, time of visit, and the purpose of the visit. This helps maintain an accurate record of admittance and ensures that only authorized personnel can enter the facility. Which of the following considerations is being followed to maintain this level of security in the lab?

A.

Human resource considerations that manage the personnel within the lab.

B.

Work area considerations that focus on the design of the workspace and equipment.

C.

Physical access considerations that define protocols surrounding the documentation of all individuals permitted into the premises.

D.

Physical and structural design considerations that address how the lab ' s physical setup supports security and entry controls.

Full Access
Question # 82

Zachary, a digital forensic analyst, is working on a cyber-espionage case involving an old workstation. The workstation used an Integrated Drive Electronics (IDE) hard disk drive which failed due to a power surge, rendering it unreadable.

Zachary believes the drive contains pivotal evidence that can aid the investigation. However, the workstation ' s motherboard also got damaged in the incident, and all of Zachary ' s available systems are modern and equipped only with SATA connectors. As a result, he can ' t directly connect the IDE drive to these systems. What should Zachary do in this scenario to retrieve the data from the IDE hard drive?

A.

Zachary should use a SATA to IDE adapter to connect the IDE hard drive to his modern systems.

B.

Zachary should send the IDE drive to a specialized data recovery service.

C.

Zachary should attempt to extract the platters from the IDE drive and place them in a working SATA drive.

D.

Zachary should try to repair the damaged workstation ' s motherboard

Full Access
Question # 83

During a fraud investigation in Denver, Colorado, two fragments are found: one begins with D0 CF 11 E0 A1 B1 1A E1, and another begins with %PDF. Hex view of the first fragment later reveals a stream named WordDocument. Which file type is most likely associated with the D0 CF 11 E0 A1 B1 1A E1 signature?

A.

Microsoft Excel Workbook xls

B.

Portable Document Format PDF

C.

Modern Office XML Document docx

D.

Microsoft Word Document doc

Full Access
Question # 84

As a computer forensic analyst at a major IT corporation, you ' re investigating a severe ransomware attack that has resulted in the encryption of significant data, impacting business operations. While analyzing the infected systems, you identify a specific ransomware strain known for its stealthy propagation methods and sophisticated encryption. Furthermore, it ' s discovered that the attackers obtained unauthorized access through a phishing email opened by an employee. What should be the primary focus of your data acquisition process in this investigation?

A.

Focus on the mailbox of the employee who received the phishing email to identify the possible source of the ransomware.

B.

Acquire the disk image of the infected systems to identify the ransomware’s activities and propagation methods.

C.

Prioritize the acquisition of backup systems to check for possible clean versions of the encrypted files.

D.

Collect all data from systems showing symptoms of ransomware infection for detailed malware analysis.

Full Access
Question # 85

In a blind SQL injection breach at an online retail platform in San Francisco, California, forensic investigators parse MySQL query logs to reconstruct schema enumeration where attackers extracted names of stored structures without visible output, using system metadata to map credential storage for targeted theft. Which literal in the decoded request most clearly indicates querying the metadata catalog for object listings?

A.

information_schema.tables

B.

table_name

C.

database()

D.

table_schema= ' dataset '

Full Access
Question # 86

Detective Harris is leading a digital forensics investigation into a cyberattack on a local bank ' s database. During the investigation, Detective Harris emphasizes the importance of maintaining the integrity of the evidence. He instructs his team to follow the established rules of thumb for data acquisition to ensure the admissibility of evidence in court. In Detective Harris ' s digital forensics investigation of the cyberattack on the bank ' s database, what step is crucial to preserving the original evidence and ensuring its integrity?

A.

Creating a duplicate bit-stream image of the suspicious drive or file

B.

Using multiple forensic tools simultaneously for data acquisition

C.

Ignoring the duplication process and proceeding with analysis directly on the original evidence

D.

Performing forensic analysis directly on the original evidence

Full Access
Question # 87

In the wake of a cyberattack, a large e-commerce platform experiences widespread system downtime, leading to significant financial losses and tarnished customer trust. As they scramble to regain control, it becomes evident that sensitive customer data has been compromised, posing a threat to data security and the platform ' s reputation. Amidst the aftermath of the cyberattack on the e-commerce platform, which of the following consequences is not the result of a lack of forensic readiness?

A.

Data manipulation, deletion, and theft

B.

System downtime

C.

Limited collaboration with legal and IT

D.

Inability to collect legally sound evidence

Full Access
Question # 88

During a botnet takedown case in Los Angeles, California, an ISP ' s abuse desk keeps receiving legal complaints about malicious traffic traced to an IP that belongs to Tor infrastructure. Investigators explain that, although the traffic did not originate there, this Tor component is the one seen by destination servers as the source and therefore attracts most abuse complaints and shutdown demands. Which Tor component are they referring to?

A.

Middle Relay

B.

Entry Guard Relay

C.

Exit Relay

D.

Bridge Node

Full Access
Question # 89

During a digital forensics investigation, an investigator is tasked with collecting data from servers and shared drives within an organization ' s infrastructure. The investigator accesses and retrieves relevant electronic evidence from these central storage locations to assist in the investigation. This data collection includes files, user logs, and other system artifacts necessary for understanding the scope of the incident. Which eDiscovery collection methodology is the investigator employing in this scenario?

A.

The investigator uses network collection to gather data directly from internal repositories and organizational data hubs across the network.

B.

The investigator uses cloud-based collection to retrieve data from cloud storage and platforms.

C.

The investigator uses email collection to extract relevant communications and attachments from email systems.

D.

The investigator uses mobile device collection to retrieve data from smartphones, tablets, or other mobile devices.

Full Access
Question # 90

Investigators conduct forensic analysis to examine Tor Browser activity. They scrutinize memory dumps to extract email artifacts and analyze storage devices for email attachments, both with the Tor Browser open and closed. Additionally, they explore forensic options post-uninstallation of the Tor Browser to uncover any residual evidence.

What is the primary objective of forensic analysis in scenarios involving the Tor Browser?

A.

To analyze email attachments solely when the Tor Browser is closed

B.

To explore email artifacts and attachments with the Tor Browser in various states

C.

To examine email artifacts only when the Tor Browser is open

D.

To perform analysis post-uninstallation of the Tor Browser

Full Access
Question # 91

During a forensic investigation into a suspected data breach, the eDiscovery team is tasked with collecting and preserving digital evidence from a compromised computer system. The team must deploy specialized tools to extract relevant data, such as emails, files, and system logs, from the machine. One team member is responsible for deploying these tools, configuring them for the specific needs of the investigation, and maintaining them throughout the entire data collection process. This individual ensures that the tools operate correctly and remain effective during the forensic analysis. Which of the following members of the eDiscovery team is responsible for this task?

A.

An eDiscovery attorney can support the deployment of essential tools for the eDiscovery team.

B.

Processing personnel can assist in the process of deploying the required tools for the eDiscovery team.

C.

Review personnel can aid in implementing the tools needed for the eDiscovery team.

D.

An eDiscovery software expert can help set up the necessary tools for the eDiscovery team.

Full Access
Question # 92

During a web-attack investigation at a retailer in Denver, analysts want to identify a step that explicitly acknowledges an attribution limitation even when gateway and server logs are available. Which methodology step states this constraint?

A.

Collect logs from the web server, application server, database server, WAF, local system events, SIEM tool, and IDS

B.

Analyze the working copies of collected logs to look for suspicious entries and correlate the data

C.

Trace the attacking IP to identify the perpetrator of the attack; this task is generally very difficult as attackers often use proxies and anonymizers to hide their identity

D.

Use encryption and checksum to verify and protect the integrity of log files

Full Access
Question # 93

Emily, a system administrator, is tasked with automating the deployment of a custom service on a group of Windows servers in her organization. She has developed a script that will be used to add the new service to each server. The service will run a custom executable file that provides specific functionality for internal applications. To ensure that the service is created correctly, Emily needs to know which SrvMan command she should use to deploy the service to the system. Which of the following SrvMan commands should Emily use to create the new service?

A.

srvman.exe add [service name] [display name] [/type:] [/start:] [/interactive:no] [/overwrite:yes]

B.

srvman.exe delete

C.

srvman.exe stop [/nowait] [/delay:]

D.

srvman.exe run [service name] [/copy:yes] [/overwrite:no] [/stopafter:]

Full Access
Question # 94

A company ' s network has been compromised by a malware attack that originated from a website seemingly offering a legitimate service. The user unknowingly visited the site, and after doing so, their system began exhibiting unusual behavior. The company discovered that the malware was executed as soon as the user visited the site, without any need for further interaction. Which technique is most likely responsible for this attack?

A.

Using spear-phishing sites to trigger the installation of malware in the target network.

B.

Distributing malware to the target network through malvertising.

C.

Leveraging black hat SEO techniques to implant malware in the target network.

D.

Installing malware on the target system via the drive by downloads method.

Full Access
Question # 95

A digital forensics investigator is tasked with analyzing a compromised Mac computer recovered from a cybercrime scene. However, upon examination, the investigator discovers that the log messages containing crucial evidence have been tampered with or deleted.

Given the tampering or deletion of log messages on the Mac computer, which anti-forensic technique is likely employed to hinder the forensic analysis process in this scenario?

A.

Data encryption

B.

Data obfuscation

C.

Data hiding

D.

Data manipulation

Full Access
Question # 96

In a workplace harassment investigation in Atlanta, a macOS user is suspected of sending threatening communications after business hours through the system ' s built-in messaging application. To recover stored chat content for timeline reconstruction and attribution analysis, where should the examiner look first for the relevant artifact?

A.

~/Library/Safari

B.

~/Library/Preferences

C.

~/Library/Messages

D.

/System/Library/CoreServices/SystemVersion.plist

Full Access
Question # 97

As part of a corporate investigation, Melissa, a forensic investigator, has been tasked with examining the web browser history, cookies, and cache on a suspect ' s laptop. The laptop has multiple web browsers installed, including Google Chrome, Firefox, and Safari. Melissa needs a tool that can comprehensively extract and analyze these digital artifacts from multiple web browsers. Which tool should she use?

A.

NetAnalysis

B.

Sleuth Kit

C.

EnCase

D.

DiskExplorer

Full Access
Question # 98

Investigators responding to a breach begin working directly at the scene. They assume control of relevant items on live systems and collect time-sensitive artifacts before any evidence is transferred for laboratory examination. Which scene assessment activity is being carried out at this stage?

A.

Take custody of exhibits and collect time-bound data

B.

Identify available exhibits at the scene

C.

Use a third party to extract evidence

D.

Process seized exhibits according to laboratory policy

Full Access
Question # 99

After a recent security incident at a popular online retail store, an incident response team is conducting an investigation. They found that an attacker was able to make thousands of purchase attempts using different combinations of credit card information within just a few minutes. The team also discovered that the same IP address was responsible for all these transactions. As a computer hacking forensic investigator, what attack type are you most likely dealing with?

A.

Cookie Poisoning attack.

B.

Brute Force attack.

C.

Parameter Tampering attack.

D.

XML External Entity (XXE) attack.

Full Access
Question # 100

A forensic investigator is examining a data breach at a corporate organization involving unauthorized access to sensitive files. During the investigation, she carefully identifies relevant data, collects it without modifying the original source, preserves its integrity, documents each step of the process, and prepares the findings for potential legal proceedings. What fundamental objective of computer forensics is being applied in this investigation?

A.

To estimate the potential impact caused by the incident on the victim and determine the intent of the perpetrator

B.

To protect the organization from similar incidents in the future

C.

To track and prosecute the perpetrators of a cyber crime

D.

To gather evidence of cyber crimes in a forensically sound manner

Full Access
Question # 101

Tom, a digital forensics investigator, is assigned to investigate a potential insider threat at a company. He arrives at the scene to find that a workstation has been compromised. The suspect, a former employee, allegedly used a malicious USB device to access sensitive files before being caught. Tom quickly begins his investigation, and after isolating the workstation from the network, he powers up the system in a controlled environment. His first task is to collect data stored in the system ' s memory, including active processes, network connections, and clipboard content. Tom knows that this type of data can provide critical information about the actions of the suspect during the time of the attack. Why is Tom prioritizing this data over other types of evidence in this case?

A.

Volatile data provide the most stable evidence.

B.

Volatile data is time-sensitive and can be lost once the system is powered off.

C.

Non-volatile data is most relevant to the case.

D.

Non-volatile data is easier to recover than volatile data.

Full Access
Question # 102

During a service-manipulation investigation at a logistics company in Columbus, Ohio, an examiner reviews the Windows System log from a compromised workstation. The timeline shows an entry indicating that a request was issued to stop a critical service, but the service did not immediately transition to a stopped state. To correctly interpret this log entry and distinguish intent from outcome, the examiner must understand what the recorded event represents. What does Event ID 7035 indicate in this context?

A.

A custom application event written by logevent.exe

B.

A Windows service successfully transitioned to a started or stopped state

C.

A control request was sent to a service to start or stop

D.

A remote-access connection recorded in the Application log

Full Access
Question # 103

An online banking system fell victim to a significant security breach. The attacker managed to access confidential customer data and the bank ' s internal communication. During the investigation, the forensic team noticed a pattern of unusual queries containing " & # x 0 0in the system logs. This led them to believe that an exploitation technique may have been used to bypass security filters and firewalls. Based on this information, which type of attack was most likely used?

A.

Directory Traversal attack.

B.

Command Injection attack.

C.

XML External Entity (XXE) attack.

D.

SQL Injection attack.

Full Access
Question # 104

In the midst of a ransomware outbreak at a bustling healthcare provider in Seattle, forensic investigator Taylor Brooks arrives to find patient records locked behind encryption, with terabytes of data overwhelming her team. As the clock ticks and lives hang in the balance, she turns to AI to swiftly comb through the massive volumes, flagging unusual patterns and isolating malicious traces that manual review would miss, allowing her to zero in on vital clues for decryption and attribution. Which AI technique is Taylor leveraging to transform this data deluge into actionable insights?

A.

Knowledge Representation

B.

Automated Data Analysis

C.

Reasoning Process

D.

Knowledge Discovery

Full Access
Question # 105

An investigator is analyzing a suspect ' s computer in connection with a corporate espionage case. The investigator needs to gather all relevant data from the device, including any provisional information that may provide insights into recent user actions. While investigating, the investigator discovers that the system has stored a variety of data from previous user activities, including text, images, and links that were recently copied. Which type of volatile data is the investigator examining in this situation?

A.

Examining data related to resources shared across the network for potential evidence.

B.

Examining driver/service information for system-level configurations.

C.

Examining print spool files for information related to printing operations.

D.

Examining the clipboard contents for information temporarily held during user interaction.

Full Access
Question # 106

During a digital forensic investigation into a suspect ' s Android device, a forensic expert is tasked with extracting Chrome artifacts such as browsing history, cookies, and cached data. The suspect may have used Chrome for browsing activities related to a cybercrime, and the investigator needs a tool that can efficiently extract this type of information from the device. Which of the following tools can assist the investigator in extracting these Chrome artifacts from an Android device?

A.

LOIC

B.

Orbot Proxy

C.

DroidSheep

D.

Magnet AXIOM

Full Access
Question # 107

Mason, a network forensic expert, is investigating a recent security incident on an organization server. While analyzing the network traffic. Mason suspected a denial-of-service attack targeting the server. To delve deeper into the traffic patterns. Mason used the Wireshark tool and applied the filter “tcp.flags==0X003 " to identify any unusual traffic behavior. Which of the following results does Mason expect from using this Wireshark filter?

A.

Detect packets moving without flogs

B.

Detect a SYN/FIN flooding attempt

C.

Detect RST packets

D.

Detect SYN packets

Full Access
Question # 108

During a routine inspection of a web server, abnormal activity suggestive of a command injection attack is discovered in the server logs. The attack vector appears to involve the exploitation of input fields to execute arbitrary commands on the server. In digital forensics, what is the primary goal of investigating a command injection attack?

A.

To prevent unauthorized access to the server logs

B.

To identify potential vulnerabilities in the web application ' s code

C.

To improve server hardware performance

D.

To analyze user behavior patterns on the website

Full Access
Question # 109

During a financial-records tampering case in Denver, Colorado, forensic examiners struggle to analyze digital evidence because the suspect used advanced anti-forensic measures that have corrupted file integrity, renamed key data sets, and encrypted drives. Which challenge best illustrates the type of obstacle caused by anti-forensics in such investigations?

A.

Creating falsified evidence can redirect investigators to the wrong conclusion

B.

Files obfuscated with packer programs can avoid detection by anti-malware tools

C.

Intentional data corruption weakens the integrity and reliability of digital evidence

D.

Modifying timestamps eliminates server logging, thereby erasing digital footprints

Full Access
Question # 110

At a financial services provider ' s online trading platform in Boston, Massachusetts, forensic analysts are examining centralized logs using Sumo Logic IIS Log Analyzer as part of an investigation into suspected resource-exhaustion activity. Overall request volume and average latency appear within normal ranges, yet certain user sessions exhibit intermittent delays that do not correlate with specific endpoints or servers. To reveal whether completion durations are concentrated within particular intervals or display skewed frequency patterns across the full dataset, which analytic view should the team select?

A.

Response throughputs

B.

Requests by server

C.

Slowest pages

D.

Response times in histogram form

Full Access
Question # 111

As a malware analyst, you ' re tasked with scrutinizing a suspicious program on a Windows workstation, particularly focusing on its interactions with system registry files. Monitoring registry artifacts provides insights into malware behavior, aiding in identifying persistence mechanisms and malicious activities. How do forensic investigators gain insights into malware behavior on Windows systems by monitoring registry artifacts?

A.

Monitoring network traffic patterns

B.

Reviewing browser history logs

C.

Tracking system file executions

D.

Analyzing registry key modifications

Full Access
Question # 112

During a malware incident response at a technology firm in Seattle, the forensic team must capture volatile data from a suspect Windows workstation while the system remains powered on. The acquisition must preserve running processes and in-memory artifacts such as encryption keys and system state. Which tool is most appropriate for this type of volatile data acquisition?

A.

LiME

B.

dd command

C.

Belkasoft Live RAM Capturer

D.

Fmem

Full Access
Question # 113

Camila, a forensic investigator, is working on a Linux machine that has been suspected of running malicious software. She wants to analyze the interactions between the running processes and the kernel, as these interactions could provide important clues about the behavior of the malware. To track the system calls made by the processes, she decides to use a tool that can intercept and record these system calls in real-time. Which tool should Camila use to monitor the system calls generated by processes on the system?

A.

strace

B.

Wireshark

C.

tcpdump

D.

Process Explorer

Full Access
Question # 114

Laura, a CHFI certified investigator, has been brought in to investigate a major incident at a software development company. A disgruntled employee had injected malicious code into several core products, causing significant damage to the company ' s reputation and bottom line. Laura had to decide the best way to gather evidence from the suspect ' s heavily used workstation, which has been running continuously for weeks and may contain critical evidence in RAM. What data acquisition strategy should Laura adopt to maximize the evidence gathered?

A.

Dead acquisition after shutting down the workstation.

B.

Copying key files to an external storage device.

C.

Remote acquisition over the network.

D.

Live acquisition from the running workstation.

Full Access
Question # 115

You ' re a digital forensic analyst tasked with analyzing a Portable Document Format (PDF) file to extract information about its structure and contents. Understanding the PDF file structure is essential for conducting a thorough analysis. What is the component of a PDF file that enables random access to objects, includes links to all objects within the file, and aids in tracking updates made to the PDF file?

A.

Header

B.

Cross-reference table (xref table)

C.

Body

D.

Footer

Full Access
Question # 116

During a robbery investigation in Phoenix, Arizona, detectives obtain carrier records to associate a seized handset with account-level activity observed around multiple towers near the crime scene. The team needs the field that identifies the subscriber in the provider ' s records rather than the handset hardware or the dialable number to correlate movements with the account. Which field should they prioritize?

A.

MSISDN

B.

Cell ID

C.

IMEI

D.

IMSI

Full Access
Question # 117

Following a cyberattack at a financial institution in Chicago, Illinois, investigators are overwhelmed by repeated alerts and duplicate log entries generated across several monitoring platforms. Before attempting correlation, the team applies a step intended to reduce noise and improve analytical efficiency. What action does this step represent?

A.

Compress data, delete repeated entries, or filter

B.

Gather logs from multiple sources into a centralized system

C.

Encrypt and authenticate data during collection

D.

Format data from different log types into a single log format

Full Access
Question # 118

A forensic investigator is assigned to a cybercrime investigation where they need to document critical evidence from a powered-on computer located at the crime scene. The computer is suspected to contain important files or programs that are part of the ongoing investigation, upon arriving at the scene, the investigator observes that the monitor of the computer is displaying a screensaver, which is obscuring any active programs or open files. The forensic team is under pressure to preserve the integrity of the evidence without modifying or tampering with any data on the machine.

The investigator needs to capture a clear image of the programs running on the screen to document the evidence properly. However, they are uncertain about how to proceed in this situation to avoid potentially altering any information on the computer. What should the investigator do to capture the active programs on the screen and document the evidence effectively?

A.

Reboot the machine to force the system to show the programs running after the restart.

B.

Move the mouse slightly and slowly to wake up the screen from the screensaver, then photograph the active programs and document them.

C.

Unplug the computer ' s main power cord to reset the system and clear any volatile data.

D.

Disconnect the network cable to prevent any remote access while documenting the evidence.

Full Access
Question # 119

During a corporate fraud investigation, analysts examine a workstation where a user attempted to obscure web activity by relying on private browsing features across multiple modern browsers. Although browser-level traces appear limited, investigators identify residual evidence indicating that user-entered queries and browsing fragments persisted beyond the active session lifecycle. From which artifact can investigators most reliably recover this type of residual evidence across multiple browsers?

A.

Cookies

B.

pagefile.sys

C.

DNS cache

D.

Temporary database files

Full Access
Question # 120

During an investigation of anomalous CPU timing patterns on a compromised virtual machine hosted by a telecom provider, forensic analysts discover that the attacker launched a malicious VM on the same physical host as the target instance and extracted cryptographic keys by analyzing shared cache behavior. Which type of cloud computing attack does this technique represent?

A.

Side-Channel Attack

B.

Service Hijacking via Network Sniffing

C.

Service Hijacking via Social Engineering

D.

Wrapping Attack

Full Access
Question # 121

During a cybersecurity investigation, logs from a Cisco switch, VPN, and DNS server are collected. These logs contain valuable information about network activities and potential security breaches.

In digital forensics, what role do Cisco switch, VPN, and DNS server logs play when analyzing network incidents?

A.

Provides insights on network traffic, device connections, and security incidents.

B.

Tracks website visits and browser history exclusively.

C.

Not pertinent to digital forensics.

D.

Details user activities within the local network.

Full Access
Question # 122

During a forensic investigation of a compromised Windows system, Investigator Sarah is tasked with extracting artifacts related to the system ' s pagefile.sys . She needs to navigate through the registry to locate this specific information. Which of the following registry paths should Sarah examine to extract pagefile.sys artifacts from the system?

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

B.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Windows

C.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName

D.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management

Full Access
Question # 123

An organization is working to minimize the eDiscovery costs associated with the extensive analysis of large sets of electronic data. To achieve this, the organization employs advanced methodologies and automated processes that allow them to effectively narrow down the amount of data that requires detailed examination, thus enhancing efficiency while maintaining compliance. By utilizing specific platforms and processes, the organization ensures that only the pertinent data is analyzed, and redundant data is excluded early in the workflow.

Which best practice is the organization implementing to ensure efficient data examination?

A.

The organization implements a data retention tool to securely dispose of data that is no longer necessary.

B.

The organization uses technology-assisted review (TAR) and data reduction tools to exclude irrelevant data from the review process.

C.

The organization employs tools to ensure a secure chain of custody throughout the entire eDiscovery process.

D.

The organization uses data mapping tools to identify custodians and track the location of relevant data.

Full Access
Question # 124

During a post-incident investigation at a retail technology company, forensic analysts must reconstruct a timeline of unauthorized modifications made to cloud resources across multiple AWS accounts. The investigation requires visibility into control-plane activity so analysts can attribute actions to specific identities and understand how configuration changes were initiated and propagated throughout the environment. How should investigators obtain this account-wide record of management activity to support timeline reconstruction?

A.

Amazon S3 Server Access Logging

B.

AWS CLI

C.

Amazon CloudWatch

D.

AWS CloudTrail

Full Access
Question # 125

During a multinational fraud investigation, forensic analysts are asked to determine where evidence stored in Microsoft Azure can legally reside. The organization ' s Azure environment includes multiple region pairs designed for redundancy and compliance, each operating under the same market-level policies for data residency. Which Azure component best represents this configuration?

A.

Non-regional Service

B.

Availability Zone

C.

Region

D.

Geography

Full Access
Question # 126

Andrew, a system administrator, is examining the UEFI boot process of a server. During the process, Andrew notices that the system is verifying the integrity of the bootloader and checking the settings before proceeding to load the operating system. The system performs cryptographic checks to ensure that only trusted software can be loaded. Andrew realizes this phase also ensures that the system boots in a secure state, adhering to policies. Identify the UEFI boot process phase Andrew is currently in.

A.

Boot device selection phase

B.

Pre-EFI initialization phase

C.

Driver execution environment phase

D.

Security phase

Full Access
Question # 127

While reviewing Cisco IOS logs for suspicious network traffic, an administrator encounters a log message with the mnemonic " %SEC-6-IPACCESSLOGP.,‘ The message indicates that a packet matching the log criteria for the given access list has been detected, either for TCP or UDP traffic. Which of the following describes the log entry?

A.

A packet has been dropped due to an access control list (ACL) rule.

B.

A packet matching the criteria defined in an access list has been allowed or denied, and it was logged for monitoring.

C.

A system-level error has occurred, related to excessive network traffic.

D.

A failed connection attempt was detected on the network.

Full Access
Question # 128

Lucas, a forensic investigator, has been tasked with analyzing the behavior of a malware sample that has infected a Linux-based system. After executing the malware, Lucas suspects that the malware is performing suspicious activities such as modifying system files, accessing restricted resources, and interacting with the kernel. In order to track the malware ' s interaction with the operating system, Lucas decides to monitor the system calls made by the malware during its execution. To gather this data, which of the following tools should Lucas use to effectively track and analyze the system calls initiated by the malware, providing insights into how the malware communicates with the OS and performs its malicious activities?

A.

Process Explorer

B.

strace

C.

Autoruns

D.

Regshot

Full Access
Question # 129

In a large-scale healthcare breach in Boston, forensic investigators must archive several terabytes of compromised patient records for long-term evidence preservation. Since the data will be written once as forensic images and accessed infrequently, analysts require the storage technology that offers maximum capacity at lower cost, even if endurance and performance are reduced. What type of NAND flash memory in the seized SSD best meets this forensic requirement?

A.

Multi-level cell MLC

B.

Triple-level cell TLC

C.

Quad-level cell QLC

D.

Single-level cell SLC

Full Access
Question # 130

In the realm of web accessibility, there are three layers: the Surface Web , which is easily accessible and indexed by standard search engines; the Deep Web , which contains unindexed content such as confidential databases and private portals; and the Dark Web , a clandestine environment often associated with illegal activities like drug trafficking and cybercrime, accessible through specialized browsers such as Tor.

What distinguishes the Dark Web from the Surface and Deep Web?

A.

It contains legal dossiers and financial records.

B.

It enables complete anonymity through encryption.

C.

It requires authorization to access.

D.

It is indexed by search engines.

Full Access
Question # 131

Gianna, a forensic investigator, is tasked with ensuring the integrity of the forensic image file she created from a suspect ' s hard drive. To verify that the image file matches the original drive, she needs to use a command that compares the image file to the original medium.

Which of the following dcfldd commands should she use to perform the verification?

A.

dcfldd if=/dev/sda vf=image.dd

B.

dcfldd if=/dev/sda split=2M of=usbimg hash=md5 hashlog=usbhash.log

C.

dcfldd if=/dev/sda of=usbimg.dat

D.

dd if=/dev/sdb | split -b 650m - image_sdb

Full Access
Question # 132

In a large multinational organization, an advanced persistent threat (APT) has been detected. One of the Linux servers of the company seems to be communicating with a known malicious IP address. Alice, a cybersecurity analyst, has been given the task to analyze the situation. She collects volatile information from the server to examine active network connections and running processes. Alice is confused between three options: Redline, Volatility, and Rekall. Which tool should Alice use to perform the analysis most effectively?

A.

Redline

B.

Volatility

C.

Rekall

D.

OSForensics

Full Access