New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CHFI v10 312-49v10 Release Date

Page: 24 / 26
Question 96

Sally accessed the computer system that holds trade secrets of the company where she Is employed. She knows she accessed It without authorization and all access (authorized and unauthorized) to this computer Is monitored.To cover her tracks. Sally deleted the log entries on this computer. What among the following best describes her action?

Options:

A.

Password sniffing

B.

Anti-forensics

C.

Brute-force attack

D.

Network intrusion

Question 97

For the purpose of preserving the evidentiary chain of custody, which of the following labels is not appropriate?

Options:

A.

Relevant circumstances surrounding the collection

B.

General description of the evidence

C.

Exact location the evidence was collected from

D.

SSN of the person collecting the evidence

Question 98

Mark works for a government agency as a cyber-forensic investigator. He has been given the task of restoring data from a hard drive. The partition of the hard drive was deleted by a disgruntled employee In order to hide their nefarious actions. What tool should Mark use to restore the data?

Options:

A.

EFSDump

B.

Diskmon D

C.

iskvlew

D.

R-Studio

Question 99

Identify the location of Recycle Bin on a Windows 7 machine that uses NTFS file system to store and retrieve files on the hard disk.

Options:

A.

Drive:\$Recycle.Bin

B.

DriveARECYCLER

C.

C:\RECYCLED

D.

DriveARECYCLED

Page: 24 / 26
Exam Code: 312-49v10
Exam Name: Computer Hacking Forensic Investigator (CHFI-v10)
Last Update: Dec 27, 2024
Questions: 704
312-49v10 pdf

312-49v10 PDF

$25.5  $84.99
312-49v10 Engine

312-49v10 Testing Engine

$28.5  $94.99
312-49v10 PDF + Engine

312-49v10 PDF + Testing Engine

$40.5  $134.99