| Exam Name: | Computer Hacking Forensic Investigator (CHFIv11) | ||
| Exam Code: | 312-49v11 Dumps | ||
| Vendor: | ECCouncil | Certification: | CHFI |
| Questions: | 443 Q&A's | Shared By: | gruffydd |
Tom, a digital forensics investigator, is assigned to investigate a potential insider threat at a company. He arrives at the scene to find that a workstation has been compromised. The suspect, a former employee, allegedly used a malicious USB device to access sensitive files before being caught. Tom quickly begins his investigation, and after isolating the workstation from the network, he powers up the system in a controlled environment. His first task is to collect data stored in the system ' s memory, including active processes, network connections, and clipboard content. Tom knows that this type of data can provide critical information about the actions of the suspect during the time of the attack. Why is Tom prioritizing this data over other types of evidence in this case?
During a live-response investigation on a compromised Ubuntu web server, analysts capture a memory image to examine suspicious behavior observed within a running process. The goal is to identify evidence of anomalous memory regions that may indicate unauthorized code execution within the address space of a specific process. How should investigators use Volatility to locate this type of memory anomaly?
During a high-stakes malware investigation, your team discovered a suspicious device driver on a compromised server. Upon analyzing the driver ' s behavior in a sandboxed environment, you notice that it is frequently accessing low-level system resources that are not typically needed by legitimate drivers. You suspect that this driver might be used as a rootkit. What technique might the rootkit be employed to evade detection?
Mia, a network administrator, is reviewing the logs of a Cisco router after noticing some performance degradation in her network. While examining the logs, she encounters a particular message that states: “The system was not able to process the packet because there was not enough room for all of the desired IP header options.” Mia needs to identify which mnemonic in the Cisco IOS logs corresponds to this specific issue. Which of the following log mnemonics should Mia look for to find this message?