CHFI QUIZ

CHFI QUIZ

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cheese

Cheese

KG - Professional Development

17 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

BCIS Recap Day 4

BCIS Recap Day 4

Professional Development

15 Qs

Security+ Study Guide-11 Implement Policies to Mitigating Risks

Security+ Study Guide-11 Implement Policies to Mitigating Risks

Professional Development

15 Qs

CISSP Asset Quiz

CISSP Asset Quiz

Professional Development

22 Qs

MySQL

MySQL

Professional Development

20 Qs

CHFI QUIZ

CHFI QUIZ

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Amru Susilo

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Recycle Bin ada sebagai metafora untuk membuang file, tetapi juga memungkinkan pengguna untuk mengambil dan memulihkan file. Setelah file dipindahkan ke Recycle Bin, sebuah catatan akan ditambahkan ke file log yang ada di Recycle Bin. Manakah dari file berikut ini yang berisi catatan yang sesuai dengan setiap file yang dihapus di Recycle Bin?

INFO2

LOGINFO1
L0GINF02
INFO 1

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Amber, a black hat hacker, has embedded a malware into a small enticing advertisement and posted it on a popular ad-network that displays across various websites. What is she doing?

Compromising a legitimate site 1

Spearphishmg

Click-jacking

Malvertislng

Click-jacking
Spearphishing
Compromising a legitimate site
Malvertising

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods of mobile device data acquisition captures ail the data present on the device, as weli as all deleted data and access to unallocated space?

Physical acquisition
Logical acquisition
Manual acquisition
Direct acquisition

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An EC2 instance storing critical data of a company got infected with malware. The forensics team took the EBS volume snapshot of the affected instance to perform further analysis and collected other data of evidentiary value. What should be their next step?

They should terminate the instance after taking necessary backup
They should keep the instance running as it stores critical data
They should pause the running instance
They should terminate all instances connected via the same VPC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are small pieces of data sent from a website and stored on the user’s computer by the user's web browser to track,validate, and maintain specific user information?

Web Browser Cache
Cookies
Temporary Files
Open files

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

POP3 is an Internet protocol used to retrieve emails from a mail server. Through which port does an email client connect with a POP3 server?

25
993
110
143

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To which phase of the computer forensics investigation process does "planning and budgeting of a forensics lab" belong?

Reporting phase
Investigation phase
Post-Investigation phase
Pre-investigation phase

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?