Eccouncil 312-49v10 Computer Hacking Forensic Investigator (CHFI-v10) Exam Practice Test

Page: 1 / 14
Total 601 questions

Question 1

Checkpoint Firewall logs can be viewed through a Check Point Log viewer that uses icons and colors in the log table to represent different security events and their severity. What does the icon in the checkpoint logs represent?

Answer : C

Question 2

In which cloud crime do attackers try to compromise the security of the cloud environment in order to steal data or inject a malware?

Answer : D

Question 3

POP3 is an Internet protocol, which is used to retrieve emails from a mail server. Through which port does an email client connect with a POP3 server?

Answer : A

Question 4

James, a hacker, identifies a vulnerability in a website. To exploit the vulnerability, he visits the login page and notes down the session ID that is created. He appends this session ID to the login URL and shares the link with a victim. Once the victim logs into the website using the shared URL, James reloads the webpage (containing the URL with the session ID appended) and now, he can browse the active session of the victim. Which attack did James successfully execute?

Answer : D

Question 5

Which of the following components within the android architecture stack take care of displaying windows owned by different applications?

Answer : D

Page:    1 / 14   
Total 601 questions