Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ECCouncil 312-49v11 Computer Hacking Forensic Investigator (CHFIv11) Exam Practice Test

Page: 1 / 15
Total 150 questions

Computer Hacking Forensic Investigator (CHFIv11) Questions and Answers

Question 1

During a forensic investigation into a cybercrime incident, an investigator is tasked with retrieving artifacts related to the crime from captured registry files. The registry files contain critical evidence, including keys and values that could shed light on the criminal activity. To successfully analyze and extract this data, the investigator needs a tool that allows manipulation and examination of binary data in a detailed and user-friendly environment.

Which of the following tools would be best suited for this task?

Options:

A.

Camtasia

B.

Rufus

C.

Dundas BI

D.

Hex Workshop

Question 2

A cybersecurity analyst is tasked with investigating a series of network anomalies. They employ various event correlation approaches, including graph-based analysis to map system dependencies and neural network-based anomaly detection. Through rule-based correlation and vulnerability-based mapping, they pinpoint potential threats and prioritize response actions effectively.

Which event correlation approach involves constructing a graph with system components as nodes and their dependencies as edges?

Options:

A.

Rule-Based Approach

B.

Codebook-Based Approach

C.

Neural Network-Based Approach

D.

Graph-Based Approach

Question 3

As a malware analyst, you're tasked with scrutinizing a suspicious program on a Windows workstation, particularly focusing on its interactions with system registry files. Monitoring registry artifacts provides insights into malware behavior, aiding in identifying persistence mechanisms and malicious activities. How do forensic investigators gain insights into malware behavior on Windows systems by monitoring registry artifacts?

Options:

A.

Monitoring network traffic patterns

B.

Reviewing browser history logs

C.

Tracking system file executions

D.

Analyzing registry key modifications

Question 4

Detective Patel, investigating a cross-border cybercrime, faces challenges in gathering evidence due to jurisdictional differences and the remote nature of the attack.

In the context of cross-border cybercrimes, what primary challenge does Detective Patel encounter in collecting evidence for prosecution?

Options:

A.

Navigate diverse legal frameworks for digital evidence across jurisdictions.

B.

Perform physical surveillance to track remote attackers across borders.

C.

Coordinate international raids simultaneously.

D.

Use advanced encryption for secure data transmission.

Question 5

Henry, a forensic investigator, has been assigned to analyze a cyber-attack that occurred on a web application hosted on an Apache server running on an Ubuntu system. The attacker is suspected of exploiting vulnerabilities within the application, and Henry needs to examine the server's logs to identify any suspicious activities.

As part of the investigation, Henry begins by navigating to the log file storage locations to analyze the Apache access logs and error logs. These logs are crucial for understanding the nature of the attack, identifying the source IPs, the exact times of the attack, and the type of attack executed.

Henry needs to locate the configuration file for Apache on Ubuntu to find where the log files are stored. In which of the following storage locations on an Ubuntu machine can Henry find useful information regarding the log files for Apache?

Options:

A.

/var/log/httpd/access_log

B.

/usr/local/etc/apache22/httpd.conf

C.

/etc/httpd/conf/httpd.conf

D.

/etc/apache2/apache2.conf

Question 6

Nora, a forensic investigator, is examining the Windows Registry of a compromised system as part of her investigation into a potential insider threat. She wants to determine which folders were most recently accessed by the user. After reviewing the Registry, she discovers that a particular Registry key stores information about the folders the user recently accessed, including the folder names and their paths in the file system. Based on her findings, which of the following Registry keys contains this information?

Options:

A.

BagMRU key

B.

MRUListEx key

C.

Bags key

D.

NodeSlot value

Question 7

Detective Sarah, a skilled digital forensics investigator, begins probing a compromised computer system linked to a cybercrime ring. Prioritizing volatile data, she meticulously plans her evidence-collection strategy. Amidst the investigation, various data sources emerge, each holding potential clues to unraveling the illicit scheme.

Which data source should you prioritize for collection, considering the order of volatility outlined in the RFC 3227 guidelines?

Options:

A.

Disk or other storage media containing potentially critical files

B.

Temporary file systems where recent activity might be stored

C.

Archival media such as a DVD-ROM or a CD-ROM

D.

The physical configuration and network topology of the system

Question 8

You are a cybersecurity analyst conducting system behavior analysis on a Windows machine infected with suspected malware. Your goal is to monitor the processes initiated and taken over by the malware after execution, as well as observe associated child processes, handles, loaded libraries, and functions to understand its behavior. As a cybersecurity analyst utilizing Process Monitor for system behavior analysis, what key feature of the tool enables comprehensive monitoring of file system, registry, and process/thread activity on a Windows machine?

Options:

A.

Capability to capture detailed information about operation input and output parameters.

B.

Real-time display of network activity initiated by processes.

C.

Automatic removal of suspicious files identified during the monitoring process.

D.

Integration with antivirus software to automatically quarantine malicious processes.

Question 9

As a digital forensic investigator, you're tasked with analyzing disk data to uncover evidence of deleted files and other relevant information. Hex editors are essential tools for examining the physical contents of a disk and searching for remnants of deleted files.

Which area of a hex editor displays theASCII representation of each byteshown in the hexadecimal area?

Options:

A.

Address area

B.

Hexadecimal area

C.

Footer area

D.

Character area

Question 10

During a cybersecurity investigation, logs from a Cisco switch, VPN, and DNS server are collected. These logs contain valuable information about network activities and potential security breaches.

In digital forensics, what role do Cisco switch, VPN, and DNS server logs play when analyzing network incidents?

Options:

A.

Provides insights on network traffic, device connections, and security incidents.

B.

Tracks website visits and browser history exclusively.

C.

Not pertinent to digital forensics.

D.

Details user activities within the local network.

Question 11

In a computer forensics seminar, Investigator Miller raises concerns about the legal complexities arising from rapid technological advancements. He stresses the importance of continuous adaptation to new technologies for effective investigations. To gauge understanding, he presents the following scenario:

Investigator Smith encountersencrypted datastored on a suspect’s hard drive. Unsure of the legality surrounding decryption, what should Investigator Smith do?

Options:

A.

Focus on other evidence to avoid legal issues.

B.

Obtain legal advice regarding decryption’s legality.

C.

Decrypt data without legal consultation, relying on investigative judgment.

D.

Decrypt data using online tools due to its suspicious encryption.

Question 12

An investigator is examining a hard disk and finds a large amount of unused space between two partitions. This space contains hidden data not recognized by the operating system.

Which of the following methods can be used to access this hidden data during a forensic investigation?

Options:

A.

Performing a full disk backup

B.

Reformatting the disk to remove the hidden data

C.

Running a disk cleanup utility

D.

Using disk editor tools to examine the inter-partition gap

Question 13

During a typical workday, employees at a reputable financial institution notice unusual behavior on their network. Suddenly, emails flood in from concerned customers reporting suspicious login attempts and strange pop-up messages. Panic ensues as the IT department investigates, discovering signs of an external attack targeting their network security.

What are examples of external attacks that pose a threat to corporate networks?

Options:

A.

Software bugs and system glitches

B.

Encryption and ransomware attacks

C.

Distributed Denial of Service (DDoS) attacks and phishing

D.

Insider threats and social engineering

Question 14

Before data acquisition, media must be sanitized to erase previous information. Industry standards dictate data destruction methods based on sensitivity levels. Investigators follow standards like VSITR, NAVSO, DoD, and NIST SP 800-88. Physical destruction options include cross-cut shredding to prevent data retrieval and protect confidentiality.

What is a crucial step in ensuring data security before data acquisition in digital forensics?

Options:

A.

Overwriting the data on the target media

B.

Recycling the target media

C.

Formatting the target media

D.

Ignoring data sanitization

Question 15

You're a digital forensic analyst tasked with analyzing a Portable Document Format (PDF) file to extract information about its structure and contents. Understanding the PDF file structure is essential for conducting a thorough analysis. What is the component of a PDF file that enables random access to objects, includes links to all objects within the file, and aids in tracking updates made to the PDF file?

Options:

A.

Header

B.

Cross-reference table (xref table)

C.

Body

D.

Footer

Question 16

In a digital forensic lab, rigorous validation of software and hardware tools ensures precision. Adherence to industry standards, regular maintenance, and continuous training uphold excellence. Accreditations such asASCLD/LABandISO/IEC 17025validate the lab’s reliability and credibility.

What is crucial for ensuringprecision and reliabilityin a digital forensic laboratory?

Options:

A.

Regular equipment maintenance

B.

All of these

C.

Adherence to industry standards

D.

Continuous investigator training

Question 17

In a critical investigation, forensic experts aim to perform physical acquisition on a rooted Android device using theddcommand. This method ensures comprehensive replication of all data, including hidden and deleted files, demanding precise execution. What steps are involved in physical acquisition on a rooted Android device using theddcommand?

Options:

A.

Establish a secure connection, navigate to the root directory, and execute DD remotely.

B.

Use custom hardware, connect directly, and execute DD for acquisition.

C.

Connect via Bluetooth, gain root access, and execute DD with source and destination.

D.

Connect the device, acquire the root shell, identify the source and destination, and execute DD.

Question 18

During call setup, a telecommunications service provider employs a multifaceted approach to verify the identity of both the calling and called parties, ensuring the legitimacy of the users involved. Sarah, a security analyst at the provider, oversees the process, utilizing a combination of unique identifiers to obtain subscriber information and perform location tracking.

Which specific mechanism stands out as the primary means for the service provider to ensure user identity during call setup?

Options:

A.

By analyzing the duration of the call.

B.

By tracking the location of the caller only.

C.

By monitoring the content of the call.

D.

By utilizing IMSI and IMEI information.

Question 19

During a cybersecurity investigation involving a data breach at a financial institution, an investigator is tasked with identifying the root cause of the breach and generating a timeline of events that led to the incident. The investigator needs to determine which step in the forensic process will help uncover the sequence of activities, including the vulnerabilities exploited, the time of attack, and the specific actions taken by the attacker. Which of the following forensic techniques is most effective for achieving this goal?

Options:

A.

Data duplication

B.

Photographing the crime scene

C.

Data analysis

D.

Data acquisition

Question 20

A forensic investigator is examining a system that has experienced a failure during booting. The investigator discovers that the boot process was interruptedafter the BIOS had initialized the system hardware. What is the next step in the boot process that would have occurred had it not failed?

Options:

A.

The boot manager would locate the bootable partition and load the MBR.

B.

The kernel would start and load the system's hardware abstraction layer (HAL).

C.

The system would load the ntoskrnl.exe file from the boot partition.

D.

The bootloader would load the operating system’s kernel.

Question 21

An investigator is working on a complex financial fraud case involving multiple government agencies. As part of the investigation, the investigator seeks to acquire certain government records to help uncover potentially fraudulent activities and determine the full scope of the crime. However, one of the government agencies involved denies access to some of the requested records, citing national security concerns and invoking a statutory exemption. Which law governs the investigator's right to request these records, and which exemption might prevent disclosure?

Options:

A.

The Federal Records Act of 1950

B.

The Freedom of Information Act (FOIA)

C.

The National Information Infrastructure Protection Act of 1996

D.

The Protect America Act of 2007

Question 22

Mia, a network administrator, is reviewing the logs of a Cisco router after noticing some performance degradation in her network. While examining the logs, she encounters a particular message that states:“The system was not able to process the packet because there was not enough room for all of the desired IP header options.”Mia needs to identify which mnemonic in the Cisco IOS logs corresponds to this specific issue. Which of the following log mnemonics should Mia look for to find this message?

Options:

A.

%SEC-4-TOOMANY

B.

%IPV6-6-ACCESSLOGP

C.

%SEC-6-IPACCESSLOGP

D.

%SEC-6-IPACCESSLOGRL

Question 23

During a cybercrime investigation involving a large-scale data breach, the investigator uncovers that the evidence is distributed across several cloud-based platforms, with the data hosted on servers in multiple countries. Although the investigator has secured the necessary legal authorizations, including international warrants and data access approvals, they are encountering significant hurdles in retrieving the data due to the complexities of multi-jurisdictional cloud repositories. These issues are causing considerable delays, hindering the timely collection of critical evidence needed to identify the perpetrators.

What is the primary challenge the investigator is facing in this case?

Options:

A.

Limited legal understanding and inadequate technical knowledge of the laws involved across different cloud-based services and jurisdictions.

B.

Lack of forensic readiness in cloud environments, preventing evidence collection.

C.

Volatile nature of evidence, with crucial logs being lost or overwritten in cloud environments.

D.

Data storage in multiple jurisdictions, leading to issues in accessing evidence.

Question 24

After a cybercrime investigation involving a compromised Windows system, an investigator is tasked with recovering private browsing artifacts. The investigator decides to retrieve data from the pagefile.sys and other live memory captures to identify traces of activity from private browsing modes.

Which tool should the investigator use to analyze the live system and recover these private browsing artifacts?

Options:

A.

PsLoggedOn

B.

Exeinfo

C.

FTK® Imager

D.

zsteg

Question 25

You, as a forensic investigator, have been assigned to investigate a case involving the suspect's email communication. During the investigation, you discover that the emails from the suspect's Trash folder may contain crucial evidence. The emails are stored in.pst files, and you must extract and analyze all relevant email messages, including those that were deleted or marked as corrupted. To ensure the integrity of the data, you need a tool that can efficiently process these files, recover any deleted messages, and provide a clear view of the email contents for analysis. Which of the following tools would be best suited for this task?

Options:

A.

P2LOCATION's Email Header Tracer

B.

Email Dossier

C.

Hunter's Email Verifier

D.

SysTools MailPro+

Question 26

Following a forensics investigation, an organization is focused on implementing a comprehensive set of policies and procedures to effectively safeguard electronic data across its systems and networks. These policies are designed to ensure compliance with applicable legal, regulatory, and operational standards while also safeguarding the integrity of the data for future audits, investigations, or legal proceedings. This stage aims to establish clear guidelines for data retention, management of access, and long-term preservation. Which stage of the Electronic Discovery Reference Model (EDRM) cycle does this activity correspond to?

Options:

A.

Disposal of unnecessary data after it is no longer required for legal or regulatory purposes.

B.

Information governance involving the creation of data control mechanisms.

C.

Collection of data from identified sources for subsequent analysis.

D.

Identification of data to ensure it is relevant and available for review.

Question 27

In a corporate setting, Bob, a software engineer, urgently needs to send an encrypted email containing sensitive project details to Alice, his project manager. Bob carefully composes the email using his corporate email client and clicks send. Little does he know that the corporate email server has been experiencing intermittent connectivity issues.

Amidst sending an urgent email, Bob encounters a delay due to connectivity issues with the corporate email server. At which stage of the email communication process does this delay likely occur?

Options:

A.

When decrypting the email message

B.

During the composition of the email

C.

During the transfer between MTA servers

D.

While searching for Alice's email domain

Question 28

During a forensic investigation into a suspected data breach, the eDiscovery team is tasked with collecting and preserving digital evidence from a compromised computer system. The team must deploy specialized tools to extract relevant data, such as emails, files, and system logs, from the machine. One team member is responsible for deploying these tools, configuring them for the specific needs of the investigation, and maintaining them throughout the entire data collection process. This individual ensures that the tools operate correctly and remain effective during the forensic analysis. Which of the following members of the eDiscovery team is responsible for this task?

Options:

A.

An eDiscovery attorney can support the deployment of essential tools for the eDiscovery team.

B.

Processing personnel can assist in the process of deploying the required tools for the eDiscovery team.

C.

Review personnel can aid in implementing the tools needed for the eDiscovery team.

D.

An eDiscovery software expert can help set up the necessary tools for the eDiscovery team.

Question 29

In a complex cybersecurity landscape, analysts strategically deployKippo honeypots, leveraging these deceptive systems to entice and ensnare potential attackers. These sophisticated decoys are meticulously designed to mimic genuine network assets, creating an illusion of vulnerability to bait adversaries. As attackers interact with the honeypots, their actions are meticulously logged, providing invaluable insights into their methodologies, tactics, and tools. Analysts diligently analyze these honeypot logs, decoding the intricate patterns of malicious behavior, and leveraging this intelligence to fortify the organization's defenses against real-world cyber threats.

Amidst the dynamic cybersecurity environment, what is the paramount objective of analyzing honeypot logs in cybersecurity operations?

Options:

A.

To meticulously identify, track, and understand the methodologies and strategies employed by attackers infiltrating the network.

B.

To monitor and evaluate the performance of the organization's security systems, optimizing defense mechanisms against cyber threats.

C.

To generate comprehensive compliance reports, ensuring adherence to regulatory standards and frameworks.

D.

To discern potential vulnerabilities within the organization's network infrastructure, facilitating proactive risk mitigation strategies.

Question 30

Sophia, a forensic investigator, is analyzing a file suspected to be an image. She is examining the file’shexadecimal signatureto identify its format. Upon inspection, she notices that the first three bytes of the file are47 49 46in hexadecimal. Based on this information, which of the following image formats is the file most likely to be?

Options:

A.

PNG

B.

BMP

C.

GIF

D.

JPEG

Question 31

Ethan, a forensic investigator, is analyzing a suspect's computer and finds a suspicious file that may be related to a cybercrime. Upon examining the file's metadata, Ethan discovers that the file has been modified several times and was last accessed shortly before the crime took place. Which of the following forensic methods would be most useful for Ethan to determine whether the file was tampered with or manipulated?

Options:

A.

Review the file's file system logs

B.

Look for hidden attributes or alternate data streams

C.

Check the file's access control list (ACL)

D.

Examine the file's hash value

Question 32

In a country where the government tightly controls internet access, a cybersecurity analyst suspects that sensitive communications are being monitored. To circumvent this surveillance, the analyst decides to use the Tor network. However, accessing the Tor network directly is impossible due to government restrictions. How can the cybersecurity analyst overcome government surveillance and access the Tor network in this scenario?

Options:

A.

Use bridge nodes to access the Tor network

B.

Utilize publicly listed Tor relay nodes

C.

Establish direct communication with the Tor exit node

D.

Collaborate with government authorities to gain access to the Tor network

Question 33

Gianna, a forensic investigator, is tasked with ensuring the integrity of the forensic image file she created from a suspect's hard drive. To verify that the image file matches the original drive, she needs to use a command that compares the image file to the original medium.

Which of the following dcfldd commands should she use to perform the verification?

Options:

A.

dcfldd if=/dev/sda vf=image.dd

B.

dcfldd if=/dev/sda split=2M of=usbimg hash=md5 hashlog=usbhash.log

C.

dcfldd if=/dev/sda of=usbimg.dat

D.

dd if=/dev/sdb | split -b 650m - image_sdb

Question 34

Scarlett, a compliance officer, is working for a publicly traded company that has recently faced accusations of financial misconduct. During her investigation, she comes across a law passed by the U.S. Congress in 2002 aimed at protecting investors from fraudulent accounting practices by corporations. This law mandates stricter corporate financial reporting standards, internal controls, and penalties for fraudulent activities.

Which of the following laws is Scarlett most likely reviewing in this case?

Options:

A.

PCI DSS

B.

SOX

C.

GLBA

D.

ECPA

Question 35

Detective Harris is leading a digital forensics investigation into a cyberattack on a local bank's database. During the investigation, Detective Harris emphasizes the importance of maintaining the integrity of the evidence. He instructs his team to follow the established rules of thumb for data acquisition to ensure the admissibility of evidence in court. In Detective Harris's digital forensics investigation of the cyberattack on the bank's database, what step is crucial to preserving the original evidence and ensuring its integrity?

Options:

A.

Creating a duplicate bit-stream image of the suspicious drive or file

B.

Using multiple forensic tools simultaneously for data acquisition

C.

Ignoring the duplication process and proceeding with analysis directly on the original evidence

D.

Performing forensic analysis directly on the original evidence

Question 36

Amelia, a cloud security analyst, is investigating a security breach in a cloud-based system where an adversary has managed to execute malicious code within the cloud environment. The attack was executed by intercepting and manipulating a SOAP message during transmission, duplicating the body of the message, and sending it to the server as though it was from a legitimate user. This manipulation resulted in the adversary gaining unauthorized access to the cloud system. What type of cloud-based attack did the adversary perform in this situation?

Options:

A.

Domain sniffing

B.

Cybersquatting

C.

Domain hijacking

D.

Wrapping attack

Question 37

Forming a specialized cybercrime investigation team for a multinational corporation. Roles assigned include photographer, incident responder, evidence examiner, and attorney. External support is enlisted for complex cases. The goal is to identify perpetrators, gather evidence, and ensure justice.

What is a crucial step in forming a specialized cybercrime investigation team?

Options:

A.

Providing legal advice

B.

Enlisting external support

C.

Conducting digital forensics analysis

D.

Assigning roles to team members

Question 38

During a federal investigation, a lawyer unintentionally discloses privileged information to a federal agency. The disclosure includes sensitive details related to a corporate client's ongoing legal dispute.

In the scenario described, what conditions must be met for the unintentional disclosure to extend the waiver of attorney-client privilege or work-product protection to undisclosed communications in both federal and state proceedings?

Options:

A.

The disclosed and undisclosed communications must concern different subject matters.

B.

The waiver must be unintentional.

C.

The disclosure must be accidental.

D.

The waiver must be intentional, and the disclosed and undisclosed communications must concern the same subject matter.

Question 39

In a multifaceted cybersecurity operation, analysts deploy a suite of cutting-edge IDS tools like Juniper, Check Point, and Snort to meticulously scrutinize logs. These logs, brimming with intricate data on network events, serve as the cornerstone of the defense, enabling analysts to discern subtle anomalies amidst the deluge of information.

Amidst the labyrinth of cybersecurity defenses, which multifaceted function do intrusion detection systems (IDS) primarily undertake, alongside their role of monitoring and analyzing events?

Options:

A.

Iteratively refining attack signatures to combat evolving threats.

B.

Vigilantly alerting security administrators via multifarious channels, including emails, pages, and SNMP traps.

C.

Synthesizing comprehensive graphical reports that encapsulate nuanced insights gleaned from monitored events.

D.

Orchestrating the seamless transmission of data to distributed logging infrastructures.

Question 40

A large multinational corporation, specializing in financial services, recently experienced a potential data breach that affected their critical business systems. As part of the forensic investigation, the organization must quickly restore its servers, both fully and at a granular level, to determine the extent of the breach and verify the integrity of sensitive financial data. The forensic team needs a comprehensive and reliable tool that can perform full image-level backups of their servers, as well as allow for selective file and folder restores in order to investigate individual systems and recover specific documents and configuration files. The tool should be able to handle both physical and virtual environments efficiently, ensuring minimal downtime and accurate data recovery.

Given the organization's need for rapid and reliable recovery, the forensic team must choose a tool that can restore entire systems in case of failure while also offering the flexibility to restore individual files or folders from the backup image. This capability is critical for isolating the compromised systems and recovering vital business records that may have been affected by the breach. The organization requires a solution that not only restores data but also provides the ability to maintain business continuity during the investigation, ensuring that systems are up and running as quickly as possible while maintaining forensic integrity.

Which of the following forensic tools would be best suited for this task?

Options:

A.

Snagit

B.

Macrium Reflect Server

C.

VMware vSphere Hypervisor

D.

Ezvid

Question 41

Hazel, a forensic investigator, is analyzing the SSH logs on a Linux server usingjournalctl. She needs to extract thefingerprint of the SSH keyfrom the logs to trace any potential unauthorized access. Which of the following commands should Hazel execute to view the SSH key fingerprint in the SSH unit logs?

Options:

A.

journalctl -u ssh --since yesterday

B.

journalctl -fu ssh

C.

journalctl -u ssh --since -1h

D.

journalctl -u ssh

Question 42

As a cybersecurity investigator, you're conducting system behavior analysis on a suspect system to detect hidden Trojans. One method involves monitoring startup programs to identify any alterations made by malware.

What command can investigators use in the command prompt to view all boot manager entries and check for potential Trojans added to the startup menu?

Options:

A.

bootrec

B.

bootcfg

C.

msconfig

D.

bcdedit

Question 43

Emma, a forensic investigator, discovers that the attacker has tampered with the timestamp metadata of several files, making it difficult to accurately determine when the files were created, accessed, or modified. Emma needs to identify files with manipulated timestamps to uncover hidden evidence. Which of the following tools can Emma use to detect timestamp modifications on NTFS file systems?

Options:

A.

analyzeMFT

B.

Regshot

C.

OSForensics

D.

Process Explorer

Question 44

As the system boots up, IT Technician Smith oversees the Macintosh boot process. After the completion of theBootROMoperation, control transitions to theBootX (PowerPC)orboot.efi (Intel)boot loader, located in the /System/Library/CoreServices directory. Smith then awaits the next step in the sequence to ensure the system initializes seamlessly.

Which subsequent step in the Macintosh boot process follows in sequence?

Options:

A.

EFI initializes the hardware interfaces

B.

Boot loader loads a pre-linked version of the kernel

C.

System selects the OS

D.

Activation of BootROM

Question 45

During a forensic investigation on an iOS device, you are tasked with retrievinggeolocation datafor various applications and system services. After examining the device, you come across several files. Which of the following files contains the geolocation data of applications and system services on iOS devices?

Options:

A.

Cookies.plist

B.

Sms.db

C.

DraftMessage.plist

D.

Clients.plist

Page: 1 / 15
Total 150 questions