Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-49v10 Exam Dumps - Computer Hacking Forensic Investigator (CHFI-v10)

Go to page:
Question # 65

What command-line tool enables forensic Investigator to establish communication between an Android device and a forensic workstation in order to perform data acquisition from the device?

A.

APK Analyzer

B.

SDK Manager

C.

Android Debug Bridge

D.

Xcode

Full Access
Question # 66

Which Federal Rule of Evidence speaks about the Hearsay exception where the availability of the declarant Is immaterial and certain characteristics of the declarant such as present sense Impression, excited utterance, and recorded recollection are also observed while giving their testimony?

A.

Rule 801

B.

Rule 802

C.

Rule 804

D.

Rule 803

Full Access
Question # 67

______allows a forensic investigator to identify the missing links during investigation.

A.

Evidence preservation

B.

Chain of custody

C.

Evidence reconstruction

D.

Exhibit numbering

Full Access
Question # 68

In which loT attack does the attacker use multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?

A.

Replay attack

B.

Jamming attack

C.

Blueborne attack

D.

Sybil attack

Full Access
Question # 69

Place the following In order of volatility from most volatile to the least volatile.

A.

Registers and cache, routing tables, temporary file systems, disk storage, archival media

B.

Register and cache, temporary file systems, routing tables, disk storage, archival media

C.

Registers and cache, routing tables, temporary file systems, archival media, disk storage

D.

Archival media, temporary file systems, disk storage, archival media, register and cache

Full Access
Question # 70

Diskcopy is:

A.

a utility by AccessData

B.

a standard MS-DOS command

C.

Digital Intelligence utility

D.

dd copying tool

Full Access
Question # 71

Which part of the Windows Registry contains the user's password file?

A.

HKEY_LOCAL_MACHINE

B.

HKEY_CURRENT_CONFIGURATION

C.

HKEY_USER

D.

HKEY_CURRENT_USER

Full Access
Question # 72

Area density refers to:

A.

the amount of data per disk

B.

the amount of data per partition

C.

the amount of data per square inch

D.

the amount of data per platter

Full Access
Go to page: