| Exam Name: | Computer Hacking Forensic Investigator (CHFIv11) | ||
| Exam Code: | 312-49v11 Dumps | ||
| Vendor: | ECCouncil | Certification: | CHFI |
| Questions: | 150 Q&A's | Shared By: | abeeha |
You are a forensic investigator working for a cybersecurity firm tasked with analyzing a suspicious Microsoft Office document named “infected_doc.” The document was discovered in an email attachment sent to multiple employees at a large corporation. Concerns have been raised about potential malware embedded within the document, particularly involving VBA macros.
As a forensic investigator examining the “infected_doc” Microsoft Office document, what initial step would you take to identify suspicious or malicious components within the file?
An investigator is examining a hard disk and finds a large amount of unused space between two partitions. This space contains hidden data not recognized by the operating system.
Which of the following methods can be used to access this hidden data during a forensic investigation?
During a network security audit, an investigator is tasked with assessing the security of nearby wireless networks. The investigator needs to gather real-time information about nearby wireless access points (APs) and display this data using diagnostic views and charts. The tool should allow them to visualize details such as signal strength, AP names, and other relevant characteristics of the networks in the area. Which of the following tools would be most appropriate for this task?
A forensic investigator is examining a system that has experienced a failure during booting. The investigator discovers that the boot process was interruptedafter the BIOS had initialized the system hardware. What is the next step in the boot process that would have occurred had it not failed?