This CHFI certification quiz is on forensics and network intrusion! When someone gains access to a network and its data without permission, there is a lot that they can do to it, and this is including but not limited to deleting, changing or sharing the data. As a certified forensic, you should be able to trace this intrusion and mark See morewhere it is from. Try out the quiz and see if you can.
Ipconfig
Nbtstat
Netstat
Ifconfig
Rate this question:
Volatile Extractor
Volatility Framework
Volatility Extractor
Volatile Framework
Rate this question:
Both application and boot prefetching are enabled.
Application prefetching is enabled.
Boot prefetching is enabled.
Prefetching is disabled.
Rate this question:
Both application and boot prefetching are enabled.
Prefetching is disabled.
Boot prefetching is enabled.
Application prefetching is enabled.
Rate this question:
Regedit
EventViewer
Wevtutil
Msconfig
Rate this question:
Log reduction
Log compression
Log conversion
Log generation
Rate this question:
Log creation and storage
Log viewing
Log analysis
Log protection and availability
Rate this question:
Eavesdropping
Phishing
Social engineering
Spamming
Rate this question:
Text file
Application data
Executable file
DNA sample
Rate this question:
Real-time analysis
Past-time analysis
Premortem
Postmortem
Rate this question:
Spoofing
Enumeration
Eavesdropping
Bottleneck
Rate this question:
HIPAA
FISMA
GLBA
PCI DSS
Rate this question:
PCI DSS
HIPAA
FISMA
GLBA
Rate this question:
GLBA
PCI DSS
SOX
FISMA
Rate this question:
Access denied to normally available web services
Web pages redirected to an unknown website
Network performance being unusually slow
Logs found to have no known anomalies
Rate this question:
MDF
NDF
LDF
Rate this question:
TXTX
EVTX
.log
.txt
Rate this question:
Web server layer
Client layer
Database layer
Business layer
Rate this question:
Business layer
Web server layer
Client layer
Database layer
Rate this question:
Information leakage
Buffer overflow
SQL injection
Cookie poisoning
Rate this question:
SQL injection
Cookie poisoning
Information leakage
Buffer overflow
Rate this question:
Broken account management
Cookie poisoning
SQL injection
Buffer overflow
Rate this question:
Buffer overflow
SQL injection
Cookie poisoning
Denial-of-service
Rate this question:
Cookie poisoning
Buffer overflow
SQL injection
Denial-of-service
Rate this question:
SQL injection
Buffer overflow
Cookie poisoning
Cross-site scripting
Rate this question:
Cookie poisoning
Cross-site request forgery
SQL injection
Buffer overflow
Rate this question:
IaaS
AaaS
SaaS
PaaS
Rate this question:
AaaS
IaaS
PaaS
SaaS
Rate this question:
Private cloud
Hybrid cloud
Community cloud
Public cloud
Rate this question:
Community cloud
Public cloud
Hybrid cloud
Private cloud
Rate this question:
Incident handlers
Law advisors
Investigators
IT professionals
Rate this question:
Investigators
Law advisors
IT professionals
Incident handlers
Rate this question:
Taking advantage of open relays or open proxies with permission
Accessing someone else’s computer to send spam mails with permission
Using legitimate information to register for multiple email accounts or domain names
Retransmitting spam messages through a computer to mislead others about the origin of the message
Rate this question:
The SMTP log
The date and time
The unique message
The unique IP address
Rate this question:
Email crime is not limited by the email organization.
Communication can occur without human intervention.
Forging the email header can hide the attacker’s identity.
Unsolicited commercial email is considered spam.
Rate this question:
Blackhat SEO
Drive-by downloads
Click-jacking
Malvertising
Rate this question:
Drive-by downloads
Malvertising
Blackhat SEO
Spear phishing sites
Rate this question:
Click-jacking
Drive-by downloads
Blackhat SEO
Malvertising
Rate this question:
Client application
Communication API
GUI API
Phone API
Rate this question:
Communication API
GUI API
Phone API
Client application
Rate this question:
Hardware
Communication API
Client application
Operating system
Rate this question:
Windows
Linux
IOS
Mac
Rate this question:
Authorize the evidence
Prosecute the evidence
Obfuscate the evidence
Preserve the evidence
Rate this question:
Magnetic storage devices
Quantum storage devices
Flash memory devices
Optical storage devices
Rate this question:
Flash memory is expensive and less efficient compared to other storage devices.
Flash memory is a non-volatile, electronically erasable and reprogrammable storage medium.
Flash memory is used in all SCSI hard drives.
Flash memory is a volatile, electronically erasable and reprogrammable storage medium.
Rate this question:
Drive:\Recycle.Bin$
Drive:\$Recycle.Bin
Drive:\RECYCLED
Drive:\RECYCLER
Rate this question:
LoggedSessions
Net sessions
PsLoggedOn
LogonSessions
Rate this question:
Log generation
Log analysis and storage
Log monitoring
Log rotation
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.