Computer Science > EXAM > CHFI EC Council Test 2022 QUESTIONS AND ANSWERS (All)

CHFI EC Council Test 2022 QUESTIONS AND ANSWERS

Document Content and Description Below

CHFI EC Council Test ETI investigation can be used to show that individuals commit crimes in furtherance of the criminal enterprise. What does ETI stands for? A. Enterprise Theory of Investigati... on B. Ethical Trading Initiative C. Ethical Theory of Investigation D. Enterprise Technical Investigation Correct Answer: A A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media is referred as computer forensics. The person who is responsible for authorization of a policy or procedure for the investigation process is referred as: A. Expert Witness B. Evidence Manager C. Decision Maker D. Incident Analyzer Correct Answer: C It is essential to understand the laws that apply to the investigation including the internal organization policies before starting the investigation process. Identify Rule 901 of forensic laws: A. Prohibits malicious mischief B. Relevant evidence generally admissible; Irrelevant evidence inadmissible C. Requirement of authentication or identification D. Evidence of character and conduct of witness Correct Answer: C Which of the following is a legal document that demonstrates the progression of evidence as it travels from original evidence location to the forensic laboratory? A. Chain of Custody B. Origin of Custody C. Evidence Document D. Evidence Examine Correct Answer: A John is a Forensic Investigator working for Rodridge Corp. He started investigating a forensic case and has collected some evidence. Now John wants to use this evidence for further analysis. What should John do? A. He should use the original evidence he has collected and proceed with the analysis process B. He should not use the original evidence he has collected C. He should send the report for further analysis D. He should not use the evidence he has collected and use some other's evidence report Correct Answer: B The digital evidence must have some characteristics to be disclosed in the court of law. The statement "Evidence must be related to the fact being proved", defines which characteristic? A. Believable B. Reliable C. Admissible D. Authentic Correct Answer: C Digital evidence is circumstantial, which makes it difficult for a forensics investigator to trace the system's activity. Identify the nature of digital evidence: A. Sturdy B. Unbreakable C. Strong D. Fragile Correct Answer: D Digital evidence is defined as "any information of probative value that is either stored or transmitted in a digital form". Which type of digital data contains system time, logged-on user(s), open files, network information, process information, process-to-port mapping, process memory, clipboard contents, service/driver information, and command history? A. Volatile Data B. Non-volatile Data C. Transient Data D. Active Data Correct Answer: A Which type of the digital data is used for the secondary storage and is long-term persisting? A. Non-volatile Data B. Volatile Data C. Transient Data D. Temporarily Accessible Data Correct Answer: A Which type of digital data stores a document file on a computer when it is deleted and helps in the process of retrieving the file until that file space is reused? A. Metadata B. Residual Data C. Archival Data D. Transient Data Correct Answer: B Rules of evidence govern whether, when, how, and for what purpose proof of a case may be placed before a trier of fact for consideration. In Federal Rules of Evidence, which rule if for Admissibility of Duplicates? A. Rule 1002 B. Rule 1004 C. Rule 1003 D. Rule 1001 Correct Answer: C Scientific Working Group on Digital Evidence (SWGDE) has defined standards and criteria for the Exchange of Digital Evidence. Which of this SWGDE standards and criteria states that "Procedures used must be generally accepted in the field or supported by data gathered and recorded in a scientific manner"? A. Standards and Criteria 1.3 B. Standards and Criteria 1.1 C. Standards and Criteria 1.2 D. Standards and Criteria 1.4 Correct Answer: A Different types of electronic devices are used for collecting potential evidence to investigate a forensic case. In which of this electronic device evidence is found through Address book, Notes, Appointment calendars, Phone numbers and Email? A. Digital Watches B. Global Positioning Systems (GPS) C. Copiers D. Scanner Correct Answer: A Analysis is the process of interpreting the extracted data to determine their significance to the case. The result of which analysis may indicate the additional steps that needs to be taken in the extraction and analysis processes? A. Timeframe Analysis B. Data Hiding Analysis C. Application and File Analysis D. Ownership and Possession Analysis Correct Answer: C "Under no circumstances should anyone, with the exception of qualified computer forensics personnel, make any attempts to restore or recover information from a computer system or device that holds electronic information".The above statement is valid for which of the following rule: A. First response rule B. Second response rule C. Evidence response rule D. Forensic response rule Correct Answer: A When collecting evidence, the collection should proceed from the most volatile to the least volatile. From the given list, identify which one of the following is least volatile: [Show More]

Last updated: 1 year ago

Preview 1 out of 9 pages

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
192
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 14, 2022

Number of pages

9

Written in

Seller


seller-icon
Crum

Member since 1 year

60 Documents Sold


Additional information

This document has been written for:

Uploaded

Jul 14, 2022

Downloads

 0

Views

 192

Document Keyword Tags

Recommended For You


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·