Eccouncil 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) Exam Practice Test

Page: 1 / 14
Total 601 questions

Question 1

Which of the following components within the android architecture stack take care of displaying windows owned by different applications?



Answer : D

Question 2

James, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, James reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did James successfully execute?



Answer : D

Question 3

POP3 is an Internet protocol, which is used to retrieve emails from a mail server. Through which port does an email client connect with a POP3 server?



Answer : A

Question 4

In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?



Answer : D

Question 5

Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?



Answer : C

Question 6

Identify the term that refers to individuals who, by virtue of their knowledge and expertise, express an independent opinion on a matter related to a case based on the information that is provided.



Answer : A

Question 7

Which of these Windows utility help you to repair logical file system errors?



Answer : D

Page:    1 / 14   
Total 601 questions