Exam Code: 312-49v11
Exam Questions: 151
Computer Hacking Forensic Investigator (CHFIv11)
Updated: 27 Feb, 2026
Viewing Page : 1 - 16
Practicing : 1 - 5 of 151 Questions
Question 1

Mateo, a forensic investigator, is analyzing a cyber-attack carried out against a target organization. During his investigation, he discovers that several important files are missing on a Linux system. Further examination reveals that one of the files, which was an executable, had erased its own content during the attack. Mateo realizes that in order to recover this file, he needs to use a Linux command that can help him retrieve the contents of this erased executable. Given the situation, which of the following commands should Mateo use to recover the lost executable file on the Linux system?

Options :
Answer: C

Question 2

During a forensic investigation into a cybercrime incident, an investigator is tasked with retrieving artifacts related to the crime from captured registry files. The registry files contain critical evidence, including keys and values that could shed light on the criminal activity. To successfully analyze and extract this data, the investigator needs a tool that allows manipulation and examination of binary data in a detailed and user-friendly environment. Which of the following tools would be best suited for this task?

Options :
Answer: D

Question 3

Elena, a forensic investigator, is analyzing the behavior of a suspected malware infection. During her analysis, she notices several abnormal entries in the Windows Event Logs, specificallyEvent ID 5156. What key information can Elena expect from these logs that could help her trace the malicious activity?

Options :
Answer: D

Question 4

During a routine digital investigation, forensic analysts suspect that sensitive information may be hidden within seemingly innocuous files. Despite extensive scanning and analysis, they are unable to detect any abnormalities using conventional surveillance techniques. What technique might attackers use to hide sensitive information within seemingly normal files, making it difficult for forensic investigators to detect?

Options :
Answer: D

Question 5

During a large-scale cybercrime investigation, the forensic investigation team is responsible for performing detailed analysis on a variety of digital evidence. To ensure the process is conducted effectively, the team needs to adhere to recognized best practices for selecting and designing analytical methods. Additionally, the team must demonstrate that they have the necessary proficiency and competence to handle the evidence, ensuring that their methodologies are robust and their results are reliable. Which ISO standard provides the necessary guidance and best practices for these processes, ensuring that the team’s analytical processes are both accurate and demonstrably competent?

Options :
Answer: A

Viewing Page : 1 - 16
Practicing : 1 - 5 of 151 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.