Cybersecurity Training

Computer Hacking Forensic Investigator (CHFI) Exam Practice

Showing 1-10 of 877 questions
Questions per page:
Question 1

Which forensic imaging tool is pre-installed on many Linux distributions?

A.
dd
Correct Answer
B.
EnCase
C.
FTK Imager
D.
Autopsy
Question 2

Harry has collected a suspicious executable file from an infected system and seeks to reverse its machine code to instructions written in assembly language. Which tool should he use for this purpose?

A.
HashCalc
B.
oledump
C.
BinText
D.
Ollydbg
Correct Answer
Question 3

Callen, a forensics officer, was tasked with investigating a recent security incident at an organization. To protect the evidence, Callen maintained a logbook of the project to record observations related to the evidence, used tagging to uniquely identify any evidence, and created a chain of custody record. Identify the investigation step performed by Callen in the above scenario.

A.
Data analysis
B.
Search and seizure
C.
Case analysis
D.
Evidence preservation
Correct Answer
Question 4

Which of the following techniques involves the analysis of logs to detect and study an incident that may have already occurred in a network or device?

A.
Cryptanalysis
B.
Social engineering
C.
Postmortem
Correct Answer
D.
Steganalysis
Question 5

What does "slack space" refer to in a file system?

A.
Space between files on disk
B.
Unused space within a file cluster
Correct Answer
C.
Deleted file fragments
D.
Empty clusters within a file
Question 6

Which tool can be used to detect rogue devices on a network?

A.
Nmap
Correct Answer
B.
Autopsy
C.
EnCase
D.
FTK Imager
Question 7

What does the superblock in Linux define?

A.
available space
B.
file synonyms
C.
location of the first inode
Correct Answer
D.
disk geometry
Question 8

The following regular expression can be used for detecting a typical SQL injection attack: /\w*((\%27)|(\'))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix Identify the signature in the above expression that searches for the word “or” with various combinations of its hex values (both uppercase and lowercase combinations).

A.
%27)|'
B.
\w*
C.
Union
D.
((%6F)|o|(%4F))((%72)|r|(%52))
Correct Answer
Question 9

Which of the following cloud computing threats arises from improper resource isolation, data storage in multiple jurisdictions, and lack of knowledge on jurisdictions?

A.
Subpoena and e-discovery
B.
Compliance risks
Correct Answer
C.
Inadequate infrastructure design and planning
D.
Unknown risk profile
Question 10

Which type of attack relies on intercepting and altering communications between two parties?

A.
DoS
B.
Phishing
C.
Keylogging
D.
Man-in-the-Middle
Correct Answer
...