Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

312-49v11 ECCouncil Computer Hacking Forensic Investigator (CHFIv11) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your ECCouncil 312-49v11 Computer Hacking Forensic Investigator (CHFIv11) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 7 / 7
Total 443 questions

During a web-attack investigation at a retailer in Denver, analysts want to identify a step that explicitly acknowledges an attribution limitation even when gateway and server logs are available. Which methodology step states this constraint?

A.

Collect logs from the web server, application server, database server, WAF, local system events, SIEM tool, and IDS

B.

Analyze the working copies of collected logs to look for suspicious entries and correlate the data

C.

Trace the attacking IP to identify the perpetrator of the attack; this task is generally very difficult as attackers often use proxies and anonymizers to hide their identity

D.

Use encryption and checksum to verify and protect the integrity of log files

During a typical workday, employees at a reputable financial institution notice unusual behavior on their network. Suddenly, emails flood in from concerned customers reporting suspicious login attempts and strange pop-up messages. Panic ensues as the IT department investigates, discovering signs of an external attack targeting their network security.

What are examples of external attacks that pose a threat to corporate networks?

A.

Software bugs and system glitches

B.

Encryption and ransomware attacks

C.

Distributed Denial of Service (DDoS) attacks and phishing

D.

Insider threats and social engineering

Jessica, a forensic investigator, was called to investigate an insider threat at a Fortune 500 company. The suspicious activity was traced back to a user ' s desktop computer. Jessica was given the computer for a thorough forensic examination. She knew the importance of data acquisition and the need for maintaining the integrity of the data. She chose a specific data acquisition method that would provide a bit-for-bit copy of the original storage medium. Which method of data acquisition did Jessica choose?

A.

Raw Data Acquisition.

B.

Sparse Data Acquisition.

C.

Differential Data Acquisition.

D.

Live Data Acquisition.

Camila, a system administrator, is tasked with investigating web traffic logs on a Windows-based server running IIS (Internet Information Services). She needs to find the location of the IIS log files in order to analyze the requests made to the server. Which of the following paths should Camila check to find the IIS log files?

A.

/usr/local/etc/apache22/httpd.conf

B.

/etc/httpd/conf/httpd.conf

C.

/etc/apache2/apache2.conf

D.

%SystemDrive%\inetpub

Andrew, a system administrator, is examining the UEFI boot process of a server. During the process, Andrew notices that the system is verifying the integrity of the bootloader and checking the settings before proceeding to load the operating system. The system performs cryptographic checks to ensure that only trusted software can be loaded. Andrew realizes this phase also ensures that the system boots in a secure state, adhering to policies. Identify the UEFI boot process phase Andrew is currently in.

A.

Boot device selection phase

B.

Pre-EFI initialization phase

C.

Driver execution environment phase

D.

Security phase

During a service-manipulation investigation at a logistics company in Columbus, Ohio, an examiner reviews the Windows System log from a compromised workstation. The timeline shows an entry indicating that a request was issued to stop a critical service, but the service did not immediately transition to a stopped state. To correctly interpret this log entry and distinguish intent from outcome, the examiner must understand what the recorded event represents. What does Event ID 7035 indicate in this context?

A.

A custom application event written by logevent.exe

B.

A Windows service successfully transitioned to a started or stopped state

C.

A control request was sent to a service to start or stop

D.

A remote-access connection recorded in the Application log

Investigators in Denver, Colorado are examining a corporate laptop suspected of data exfiltration. Instead of capturing the entire drive sector-by-sector, they decide to only acquire a targeted subset of files and directories relevant to the case to reduce acquisition time and storage needs. Which type of data acquisition are they performing?

A.

Bitstream disk-to-disk acquisition

B.

Bitstream acquisition

C.

Logical acquisition

D.

Sparse acquisition

In a prolonged embezzlement investigation at an investment bank in Charlotte, North Carolina, seized ledgers and storage devices move through multiple custodians, including intake personnel, forensic examiners, and auditors. Each transfer must be documented to address potential claims of evidence tampering during testimony. Which documentation element establishes this continuous record of handling and transfer?

A.

Lists individuals involved in evidence handling and their actions

B.

Describes procedures for collecting and storing evidence

C.

Documents the movement of evidence from its origin through examination

D.

Identifies the collector and basic evidence descriptors

Following a cybersecurity incident at an organization, a forensic investigator is tasked with collecting Electronically Stored Information (ESI) as part of the investigation. To streamline the data collection process, the investigator restricts the range and size of ESI from custodians, limiting the collection to specific file types and directories on a computer. This approach ensures that only relevant information is collected while minimizing the impact on other devices. Which eDiscovery collection methodology is being used in this scenario?

A.

Investigator leverages custodian self-collection to gather sensitive evidence data.

B.

Investigator uses incremental collection, focusing on newly created or modified data.

C.

Investigator uses remote acquisition of data from custodians ' systems via network connections.

D.

Investigator employs a directed collection of definite data sets and system areas.

During a forensic investigation of a corporate workstation in Chicago, analysts notice that malicious executables continue to launch automatically every time the system is rebooted. Further inspection reveals that the malware inserted instructions into the Windows registry to ensure persistence. Which Windows AutoStart registry location enables a program to execute at each user logon, supporting recurring persistence after reboot?

A.

Run

B.

RunOnce

C.

RunServicesOnce

D.

RunServices

Lucas, a forensic investigator, has been tasked with analyzing the behavior of a malware sample that has infected a Linux-based system. After executing the malware, Lucas suspects that the malware is performing suspicious activities such as modifying system files, accessing restricted resources, and interacting with the kernel. In order to track the malware ' s interaction with the operating system, Lucas decides to monitor the system calls made by the malware during its execution. To gather this data, which of the following tools should Lucas use to effectively track and analyze the system calls initiated by the malware, providing insights into how the malware communicates with the OS and performs its malicious activities?

A.

Process Explorer

B.

strace

C.

Autoruns

D.

Regshot

Jennifer, an experienced CHFI investigator, is working on a case involving an international cybercrime ring that has launched numerous attacks on multiple corporations across the globe. One of the attacks involved breaching a large bank ' s security system and transferring millions of dollars into untraceable offshore accounts. The investigation has spanned several months and across multiple jurisdictions. Recently, a tip leads Jennifer to a local suspect ' s home, where she believes crucial digital evidence may be stored. However, the suspect is a citizen of another country, and his home is protected under diplomatic immunity laws. The situation is further complicated by the bank ' s impatient demand for resolution and the suspect ' s insistence on his right to privacy. Jennifer needs to balance her respect for legal boundaries with the urgency of resolving the case. What should she do?

A.

She should wait until the suspect leaves the country and then seize his computer.

B.

She should use a decryption tool to remotely access the suspect ' s computer and gather the evidence.

C.

She should consult legal counsel and try to obtain a warrant under international law.

D.

She should sneak into the suspect ' s home while he is away and try to collect the evidence.

Page: 7 / 7
Total 443 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved