100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Certified Hacking Forensic Investigator (CHFI) - Exam Prep Latest Update Graded A+

Beoordeling
-
Verkocht
-
Pagina's
872
Cijfer
A+
Geüpload op
08-06-2024
Geschreven in
2023/2024

What is a swap file? Space on a hard disk used as virtual memory expansion for RAM What is a swap file? Space on a hard disk used as virtual memory expansion for RAM System time is one example of volatile information that forensic investigators should collect. What are types of time that should be recorded? System time, wall time, time system has been running (Date /t and Time /t can be typed in a command prompt in windows to retrieve the system time) System time is one example of volatile information that forensic investigators should collect. What are types of time that should be recorded? System time, wall time, time system has been running (Date /t and Time /t can be typed in a command prompt in windows to retrieve the system time) Choose the list of tools and commands used to determine logged-on users: PsLoggedOn, Net Sessions, LogonSessionChoose the list of tools and commands used to determine logged-on users: PsLoggedOn, Net Sessions, LogonSession What tools can be used to see which files are open? Net file, PsFile, Openfiles (Net file reveals names of all open shared files and the number of file locks, PsFile shows list of files open remotely, openfiles can be used to list or disconnect all open files and folders) What tools can be used to see which files are open? Net file, PsFile, Openfiles (Net file reveals names of all open shared files and the number of file locks, PsFile shows list of files open remotely, openfiles can be used to list or disconnect all open files and folders) True or False: When connections are made to other systems using NetBIOS communications, the system will maintain a list of other systems connected. By viewing the contents of the name table cache, an investigator might be able to find other systems affected. True (A cache is duplicate data stored in a temporary location so a computer can rapidly access that data. In this case, the NetBIOS Remote Cache Name Table may contain a list of systems that a computer has connected to. nbtstat -c can be used to view the cache of NetBIOS names on the host operating system)True or False: When connections are made to other systems using NetBIOS communications, the system will maintain a list of other systems connected. By viewing the contents of the name table cache, an investigator might be able to find other systems affected. True (A cache is duplicate data stored in a temporary location so a computer can rapidly access that data. In this case, the NetBIOS Remote Cache Name Table may contain a list of systems that a computer has connected to. nbtstat -c can be used to view the cache of NetBIOS names on the host operating system) It appears the suspect's computer is connected to a network, what is one thing an investigator should look for? Network connections (Information about network connections can expire over time so an investigator must collect evidence as soon as possible after an incident.) It appears the suspect's computer is connected to a network, what is one thing an investigator should look for? Network connections (Information about network connections can expire over time so an investigator must collect evidence as soon as possible after an incident.) What are two commands to obtain network information? netstat -ano & netstat -r(* netstat -ano shows active connections including protocol, local address, foreign address, state and PID * netstat -r shows the routing table * netstat -b displays the executable involved in creating the connection * netstat -v is used in conjunction with -b to show sequence of components involved) What are two commands to obtain network information? netstat -ano & netstat -r (* netstat -ano shows active connections including protocol, local address, foreign address, state and PID *

Meer zien Lees minder
Instelling
Certified Hacking Forensic Investigator - E
Vak
Certified Hacking Forensic Investigator - E











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Certified Hacking Forensic Investigator - E
Vak
Certified Hacking Forensic Investigator - E

Documentinformatie

Geüpload op
8 juni 2024
Aantal pagina's
872
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
GOLDENHEART Wgu
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
499
Lid sinds
3 jaar
Aantal volgers
376
Documenten
2648
Laatst verkocht
1 dag geleden

3,8

52 beoordelingen

5
29
4
7
3
5
2
0
1
11

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen