0% found this document useful (0 votes)
733 views5 pages

Chfi PDF

This document provides a sample exam for the ECCouncil Computer Hacking Forensics Investigator (CHFI) certification. It includes 10 multiple choice practice questions covering topics like forensic investigation procedures, Windows artifacts, and data compression techniques.

Uploaded by

ajie amiseno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
733 views5 pages

Chfi PDF

This document provides a sample exam for the ECCouncil Computer Hacking Forensics Investigator (CHFI) certification. It includes 10 multiple choice practice questions covering topics like forensic investigation procedures, Windows artifacts, and data compression techniques.

Uploaded by

ajie amiseno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

ECCouncil CHFI

Computer Hacking Forensics Investigator


ECCouncil CHFI Dumps Available Here at:
https://www.certification-questions.com/eccouncil-exam/chfi-dumps.html

Enrolling now you will get access to 486 questions in a unique set of
CHFI dumps

Question 1
Consistency in the investigative report is more important than the exact format in the report to eliminate
uncertainty and confusion.

Options:

A. True

B. False

Answer: A

Question 2
The Electronic Serial Number (ESN) is a unique _ recorded on a secure chip in a mobile phone by the
manufacturer.

Options:

A. 16-bit identifier

B. 24-bit identifier

C. 32-bit identifier

D. 64-bit identifier

Answer: C

Question 3
Event correlation is a procedure that is assigned with a new meaning for a set of events that occur in a
predefined interval of time.
Which type of correlation will you use if your organization wants to use different OS and network hardware
platforms throughout the network?

Options:

https://www.certification-questions.com
ECCouncil CHFI

A. Same-platform correlation

B. Cross-platform correlation

C. Multiple-platform correlation

D. Network-platform correlation

Answer: B

Question 4
The Recycle Bin is located on the Windows desktop. When you delete an item from the hard disk, Windows
sends that deleted item to the Recycle Bin and the icon changes to full from empty, but items deleted from
removable media, such as a floppy disk or network drive, are not stored in the Recycle Bin. What is the size
limit for Recycle Bin in Vista and later versions of the Windows?

Options:

A. No size limit

B. Maximum of 3.99 GB

C. Maximum of 4.99 GB

D. Maximum of 5.99 GB

Answer: A

Question 5
The need for computer forensics is highlighted by an exponential increase in the number of cybercrimes
and
litigations where large organizations were involved. Computer forensics plays an important role in tracking
the
cyber criminals.
The main role of computer forensics is to:

Options:

A. Maximize the investigative potential by maximizing the costs

B. Harden organization perimeter security

C. Document monitoring processes of employees of the organization

D. Extract, process, and interpret the factual evidence so that it proves the attacker's actions in the
court

Answer: D

https://www.certification-questions.com
ECCouncil CHFI

Question 6
First responder is a person who arrives first at the crime scene and accesses the victim's computer system
after the incident. He or She is responsible for protecting, integrating, and preserving the evidence obtained
from the crime scene.
Which of the following is not a role of first responder?

Options:

A. Identify and analyze the crime scene

B. Protect and secure the crime scene

C. Package and transport the electronic evidence to forensics lab

D. Prosecute the suspect in court of law

Answer: D

Question 7
Smith, an employee of a reputed forensic Investigation firm, has been hired by a private organization to
investigate a laptop that is suspected to be involved in hacking of organization DC server. Smith wants to
find
all the values typed into the Run box in the Start menu. Which of the following registry key Smith will check
to
find the above information?

Options:

A. UserAssist Key

B. MountedDevices key

C. RunMRU key

D. TypedURLs key

Answer: C

Question 8
What document does the screenshot represent?

https://www.certification-questions.com
ECCouncil CHFI

Options:

A. Chain of custody form

B. Search warrant form

C. Evidence collection form

D. Expert witness form

Answer: A

Question 9
Which of the following commands shows you all of the network services running on Windows-based
servers?

Options:

A. Net start

B. Net use

C. Net Session

D. Net share

https://www.certification-questions.com
ECCouncil CHFI

Answer: A

Question 10
Data compression involves encoding the data to take up less storage space and less bandwidth for
transmission. It helps in saving cost and high data manipulation in many business applications.
Which data compression technique maintains data integrity?

Options:

A. Lossless compression

B. Lossy compression

C. Speech encoding compression

D. Lossy video compression

Answer: A

Would you like to see more? Don't miss our CHFI PDF
file at:
https://www.certification-questions.com/eccouncil-pdf/chfi-pdf.html

https://www.certification-questions.com

You might also like