Collinss
I know how frustrating it can get with all those assignment deadlines and Impeding examinations! Nursing Being my main profession line, I have essential guides that are A graded and that have helped me a lot.
I am a super friendly person and you can message me for any assistance whatsoever.
We have to have each other's backs.
- 609
- 0
- 13
Community
- Followers
- Following
622 items
CHFI - Chapter 3 (Hard Disks and File Systems) Test 100% Solved
CHFI - Chapter 3 (Hard Disks and File Systems) Test 
100% Solved 
This RAID architecture uses Byte level stripping with a dedicated parity disk - RAID 3 
This RAID architecture does not use any parity, striping or mirrioring - RAID 2 
This RAID architecture uses Hamming code and ECC - RAID 2 
This RAID architecture provides the best performance of the single RAID levels but does not 
providing mirroring - RAID 0 
This RAID architecture uses disk mirroring and copies data to multiple disks at ...
- Exam (elaborations)
- • 21 pages •
CHFI - Chapter 3 (Hard Disks and File Systems) Test 
100% Solved 
This RAID architecture uses Byte level stripping with a dedicated parity disk - RAID 3 
This RAID architecture does not use any parity, striping or mirrioring - RAID 2 
This RAID architecture uses Hamming code and ECC - RAID 2 
This RAID architecture provides the best performance of the single RAID levels but does not 
providing mirroring - RAID 0 
This RAID architecture uses disk mirroring and copies data to multiple disks at ...
CHFI: Hard Disks & File Systems Latest Updated 100% Solved
CHFI: Hard Disks & File Systems Latest Updated 
100% Solved 
HDD - (Hard Drive Disk) 
non-volatile, 
records data magnetically 
SSD - (Solid State Drive) 
solid-state memory, 
uses microchips, 
expensive, 
supports a restricted number of writes over the life of the device 
Two memories: 
- NAND-based flash memory; 
(retains memory even w/o power) 
- Volatile RAM 
(faster access) 
Disk drive types - - Magnetic storage devices 
(e.g., floppy disks, magnetic tapes) 
- Optical storage devices 
(...
- Exam (elaborations)
- • 50 pages •
CHFI: Hard Disks & File Systems Latest Updated 
100% Solved 
HDD - (Hard Drive Disk) 
non-volatile, 
records data magnetically 
SSD - (Solid State Drive) 
solid-state memory, 
uses microchips, 
expensive, 
supports a restricted number of writes over the life of the device 
Two memories: 
- NAND-based flash memory; 
(retains memory even w/o power) 
- Volatile RAM 
(faster access) 
Disk drive types - - Magnetic storage devices 
(e.g., floppy disks, magnetic tapes) 
- Optical storage devices 
(...
CHFI - Chapter 9 (Database Forensics) Latest Already Passed
CHFI - Chapter 9 (Database Forensics) Latest 
Already Passed 
In SQL Server, how many .ndf files can there be? - 0,1 or many 
In SQL Server, how many .mdf files can there be? - 1 
In SQL Server, how many .ldf files can there be? - 1 
In SQL Server, how many components exist in a data page? - 3 (Page Header, Data Rows, 
Offset table) 
In SQL Server, what is the minimum storage unit - 8kb 
Name a tool to review SQL Server logs - ApexSQL Audit 
Which parameter will you use with sqlcmd to initiat...
- Exam (elaborations)
- • 9 pages •
CHFI - Chapter 9 (Database Forensics) Latest 
Already Passed 
In SQL Server, how many .ndf files can there be? - 0,1 or many 
In SQL Server, how many .mdf files can there be? - 1 
In SQL Server, how many .ldf files can there be? - 1 
In SQL Server, how many components exist in a data page? - 3 (Page Header, Data Rows, 
Offset table) 
In SQL Server, what is the minimum storage unit - 8kb 
Name a tool to review SQL Server logs - ApexSQL Audit 
Which parameter will you use with sqlcmd to initiat...
CHFI – Steganography Questions with 100% Correct Answers Already Passed
CHFI – Steganography Questions with 100% Correct 
Answers Already Passed 
Image Steganography - Hiding information in image files 
Document steganography - Adds white spaces and tabs to the ends of the lines 
Folder Steganography - Hiding one or more files in a folder 
Video steganography - Hiding files in a video file 
Audio Steganography - Hidden messages in digital sound
- Exam (elaborations)
- • 2 pages •
CHFI – Steganography Questions with 100% Correct 
Answers Already Passed 
Image Steganography - Hiding information in image files 
Document steganography - Adds white spaces and tabs to the ends of the lines 
Folder Steganography - Hiding one or more files in a folder 
Video steganography - Hiding files in a video file 
Audio Steganography - Hidden messages in digital sound
CHFI - Chapter 7 (Network Forensics) with 100% Correct Answers Rated A+
CHFI - Chapter 7 (Network Forensics) with 100% 
Correct Answers Rated A+ 
In this type of attack, the attacker sends messages to the computer with an address that indicates 
the messages are coming from a trusted host. - IP Address Spoofing 
This is the process of gathering information about a network that may help in an attacking the 
network. - Enumeration 
This attack refers to the exploitation of a session-token generation mechanism or token security 
controls, such that the attacker can ...
- Exam (elaborations)
- • 12 pages •
CHFI - Chapter 7 (Network Forensics) with 100% 
Correct Answers Rated A+ 
In this type of attack, the attacker sends messages to the computer with an address that indicates 
the messages are coming from a trusted host. - IP Address Spoofing 
This is the process of gathering information about a network that may help in an attacking the 
network. - Enumeration 
This attack refers to the exploitation of a session-token generation mechanism or token security 
controls, such that the attacker can ...
CHFI Tools Questions and Answers | Latest update Already Passed
CHFI Tools Questions and Answers | Latest update 
Already Passed 
in linux can be used locate residual data - DD Tool 
a. Networking/protocol stack tool and function - Netstat tool 
a. Allow view of information in the name resolution cache in a Windows machine - Nbtstat 
in Windows 
a. Allows view of routing table - 5. Route print 
i. A tool that blocks modification of the source drive - Write blocker 
a. DeepSpar Recovery Environment is a free Windows-based application 
b. DeepSpar Operations...
- Exam (elaborations)
- • 39 pages •
CHFI Tools Questions and Answers | Latest update 
Already Passed 
in linux can be used locate residual data - DD Tool 
a. Networking/protocol stack tool and function - Netstat tool 
a. Allow view of information in the name resolution cache in a Windows machine - Nbtstat 
in Windows 
a. Allows view of routing table - 5. Route print 
i. A tool that blocks modification of the source drive - Write blocker 
a. DeepSpar Recovery Environment is a free Windows-based application 
b. DeepSpar Operations...
CHFI test Completed with 100% Verified Solutions | Already Passed
CHFI test Completed with 100% Verified Solutions | 
Already Passed 
do not turn the computer off or on, run any programs, or attempt to access data on a computer - 
the first step required in preparing a computer for forensics investigation is 
the sniffing recording acquisition and analysis of the the network traffic and event logs in order 
to investigate a network security incident - network forensics 
which of the follwing commands shows you the names of all open shared files on a server ...
- Exam (elaborations)
- • 49 pages •
CHFI test Completed with 100% Verified Solutions | 
Already Passed 
do not turn the computer off or on, run any programs, or attempt to access data on a computer - 
the first step required in preparing a computer for forensics investigation is 
the sniffing recording acquisition and analysis of the the network traffic and event logs in order 
to investigate a network security incident - network forensics 
which of the follwing commands shows you the names of all open shared files on a server ...
CHFI Test 1 with 100% Verified Solutions | Already Graded
CHFI Test 1 with 100% Verified Solutions | Already 
Graded 
18 USC §1030 covers: - fraud and related activity in connection with computers 
This Federal statute covers child pornography. - 18 USC 2252A 
This rule involves rulings on evidence. - Rule 103 
Sara is an Assistant U.S. Attorney. She knows that this rule covers the general admissibility of 
relevant evidence. - Rule 402 
This person provides legal advice about the investigation and any potential legal issues in the 
forensic inves...
- Exam (elaborations)
- • 6 pages •
CHFI Test 1 with 100% Verified Solutions | Already 
Graded 
18 USC §1030 covers: - fraud and related activity in connection with computers 
This Federal statute covers child pornography. - 18 USC 2252A 
This rule involves rulings on evidence. - Rule 103 
Sara is an Assistant U.S. Attorney. She knows that this rule covers the general admissibility of 
relevant evidence. - Rule 402 
This person provides legal advice about the investigation and any potential legal issues in the 
forensic inves...
CHFI study guide Completed with 100% Verified Solutions
CHFI study guide Completed with 100% Verified 
Solutions 
What is the first step required in preparing a computer for forensics investigation? - Do not 
turn the computer off or on, run any programs, or attempt to access data on a computer. 
True or false? 
Network forensics can be defined as the sniffing, recording, acquisition and analysis of the 
network traffic and event logs in order to investigate a network security incident. - True 
What command shows you the names of all open shared f...
- Exam (elaborations)
- • 14 pages •
CHFI study guide Completed with 100% Verified 
Solutions 
What is the first step required in preparing a computer for forensics investigation? - Do not 
turn the computer off or on, run any programs, or attempt to access data on a computer. 
True or false? 
Network forensics can be defined as the sniffing, recording, acquisition and analysis of the 
network traffic and event logs in order to investigate a network security incident. - True 
What command shows you the names of all open shared f...
CHFI Rules Exam with 100% Verified Solutions | Already Passed
CHFI Rules Exam with 100% Verified Solutions | 
Already Passed 
Rule 101 - Scope - govern proceedings in the courts of the United States 
Rule 102 - Purpose and Construction - to secure fairness in administration, elimination of 
unjustifiable expense and delay, and promotion of growth and development of the law of evidence to the 
end that the truth may be ascertained and proceedings justly determined. 
Rule 103 - Ruling on Evidence 
Rule 105 - Limited Admissibility - the court, upon request...
- Exam (elaborations)
- • 2 pages •
CHFI Rules Exam with 100% Verified Solutions | 
Already Passed 
Rule 101 - Scope - govern proceedings in the courts of the United States 
Rule 102 - Purpose and Construction - to secure fairness in administration, elimination of 
unjustifiable expense and delay, and promotion of growth and development of the law of evidence to the 
end that the truth may be ascertained and proceedings justly determined. 
Rule 103 - Ruling on Evidence 
Rule 105 - Limited Admissibility - the court, upon request...