CHFI test Completed with 100% Verified
Solutions | Already Passed
which of the following wireless access control attacks allows the attacker to set up a rogue access
point outside the corporate perimeter, and then lure the employees of the organization to connect
to it - ✔✔client mis-association
the operating system marks the files name in the mft with a special character that indicates
that the file has been deleted - ✔✔what happens when a file is deleted in windows
is the process of starting a computer from a powered-down or off state - ✔✔cold boot
if the info2 file is deleted, it is re-created when - ✔✔restart windows
which of the following encryption algorithm is used dvwpa2 - ✔✔aes-ccmp
are used to read and write data to disks in disk drives - ✔✔disk drive heads
a bit-by-bit copy of the original storage medium and exact cpy of the original disk -
✔✔bit-stream copy
the cracking of the operating system and all other utilities that enable a computer to function -
✔✔system software password cracking
,steganogrphy technique that allows you to encode information the ensures creation of cover
for secret communication - ✔✔cover generation techniques
key combination that recovers the IMEI number of a cell phone - ✔✔*#06#
is responsible for securing the scene and ensuring that it is maintained in a secure state until
the forensic team advises - ✔✔Non-Laboratory staff
a new line injection attack is achieved by an injecting what into the log file - ✔✔Plaintext
during the seizure of digital evidence, the _________ cannot be allowed to touch the computer
system. - ✔✔suspects
a password cracking technique that works like a dictionary attack, but adds some numbers and
symbols to the words from the dictionary and tries to crack the password. - ✔✔Hybrid attack
is more important than the exact format in the report to eliminate uncertainty and confusion
- ✔✔Consistency
when dealing with the powered-off computer - ✔✔leave it off
MAC filtering address length - ✔✔48-bit address
,command in windows 7 to access the arp table - ✔✔C;\arp -a
wis a root folder of the registry editor - ✔✔hkey_users
command that will allow you to look at which sessions the machine has opened with
other systems - ✔✔net use
A set of ANSI standard electronic interfaces that allow personal computers to communicate with
peripheral hardware such as disk drives, tape drives. CD-ROM drives, printers, and scanners -
✔✔what is a scsi
windows command that displays the network configuration of nics - ✔✔ipconfig /all
linux journaling file system - ✔✔ext3
steganography types hide the secret message in a specifically designed pattern on the
document that is unclear to the average reader - ✔✔Open code steganography
provide an Interface between end users and web servers through a set of web
pages that are generated at the server-end or contain script code to be executed dynamically
within
the client Web browser - ✔✔web applications
, an attack that sends dns packets to non-company configured IP - ✔✔dns poisoning
table is used to covert huge word lists into password hashes - ✔✔Rainbow tables
a communication standard used in serial communication of data acquistion systems - ✔✔rs2332
an incorrect procedure when preserving digital evidence - ✔✔extract windows event viewr log
files
an aspect of organizational security, especially focusing on IT security - ✔✔application security
checks and compares all the fields systematically and
intentionally for positive and negative correlation with each other to determine the correlation
across one or multiple fields - ✔✔automated field correlation approach
the processes and techniques used to collect, aggregate, and analyze
computer-generated log messages. It consists of the hardware, software, network and media
used to
generate, transmit, store, analyze, and dispose of log data - ✔✔Log management
Data files from original evidence should _____ be used for forensics analysis - ✔✔never
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.