| Exam Name: | Computer Hacking Forensic Investigator (CHFIv11) | ||
| Exam Code: | 312-49v11 Dumps | ||
| Vendor: | ECCouncil | Certification: | CHFI |
| Questions: | 443 Q&A's | Shared By: | gurfateh |
Hazel, a forensic investigator, is analyzing the SSH logs on a Linux server using journalctl . She needs to extract the fingerprint of the SSH key from the logs to trace any potential unauthorized access. Which of the following commands should Hazel execute to view the SSH key fingerprint in the SSH unit logs?
A retail platform in Austin, Texas reports repeated bot traffic and injection attempts detected at its software-based gateway. As the incident team begins evidence collection, which step in the web-attack investigation methodology explicitly directs them to include output from that gateway as a primary evidence source?
Emily, a cyber forensic investigator, has been called upon to investigate a case involving smartphone evidence. The primary devices are an Android and an iOS phone. Emily decides to perform a logical acquisition on both devices to gather evidence. From the given choices, which tool should she use that can provide a thorough logical acquisition of both Android and iOS devices?
In your capacity as a cybersecurity expert, you have been asked to investigate a potential security breach in an international organization. You notice that the attacker employed trail obfuscation techniques, making it difficult to trace their activity. What approach should you take to overcome these anti-forensics technique and identify the potential breach source?