최신 312-49v11 무료덤프 - EC-COUNCIL Computer Hacking Forensic Investigator (CHFI-v11)
SMTP (Simple Mail Transfer protocol) receives outgoing mail from clients and validates source and destination addresses, and also sends and receives emails to and from other SMTP servers.
정답: A
George was recently fired from his job as an IT analyst at Pitts and Company in Dallas Texas.
His main duties as an analyst were to support the company Active Directory structure and to create network polices. George now wants to break into the company's network by cracking some of the service accounts he knows about.
Which password cracking technique should George use in this situation?
His main duties as an analyst were to support the company Active Directory structure and to create network polices. George now wants to break into the company's network by cracking some of the service accounts he knows about.
Which password cracking technique should George use in this situation?
정답: A
What is a bit-stream copy?
정답: B
Which of the following files gives information about the client sync sessions in Google Drive on Windows?
정답: B
Why should you note all cable connections for a computer you want to seize as evidence?
정답: B
An organization has hired a digital forensics investigator to evaluate its Standard Operating Procedures (SOPs) for digital evidence handling. The investigator has identified some issues and needs to recommend improvements. Which of the following would NOT be a recommendation per Scientific Working Group on Digital Evidence (SWGDE) guidelines?
정답: A
When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?
정답: B
Debbie has obtained a warrant to search a known pedophiles house. Debbie went to the house and executed the search warrant to seize digital devices that have been recorded as being used for downloading Illicit Images. She seized all digital devices except a digital camera.
Why did she not collect the digital camera?
Why did she not collect the digital camera?
정답: B
Which principle states that "anyone or anything, entering a crime scene takes something of the scene with them, and leaves something of themselves behind when they leave"?
정답: A
Which of the following tools will allow a forensic Investigator to acquire the memory dump of a suspect machine so that It may be Investigated on a forensic workstation to collect evidentiary data like processes and Tor browser artifacts?
정답: B
Steve received a mail that seemed to have come from her bank. The mail has instructions for Steve to click on a link and provide information to avoid the suspension of her account. The link in the mail redirected her to a form asking for details such as name, phone number, date of birth, credit card number or PIN, CW code, SNNs, and email address. On a closer look, Steve realized that the URL of the form in not the same as that of her bank's. Identify the type of external attack performed by the attacker In the above scenario?
정답: D
POP3 is an Internet protocol, which is used to retrieve emails from a mail server. Through which port does an email client connect with a POP3 server?
정답: D
With regard to using an antivirus scanner during a computer forensics investigation, you should:
정답: D
A forensic investigator has collected a compromised Amazon Echo Dot and a smartphone from a crime scene. The Alexa app on the smartphone is synced with the Echo Dot. To begin investigating these devices, the investigator needs to obtain certain artifacts. In this scenario, which of the following sequence of steps should the investigator follow to acquire the necessary artifacts for a client-based analysis?
정답: C
Identify the file system that uses $BitMap file to keep track of all used and unused clusters on a volume.
정답: B