Exam Name: | Computer Hacking Forensic Investigator (CHFI-v10) | ||
Exam Code: | 312-49v10 Dumps | ||
Vendor: | ECCouncil | Certification: | CHFI v10 |
Questions: | 704 Q&A's | Shared By: | malachi |
Which of the following attacks refers to unintentional download of malicious software via the Internet? Here, an attacker exploits flaws in browser software to install malware merely by the user visiting the malicious website.
When installed on a Windows machine, which port does the Tor browser use to establish a network connection via Tor nodes?
What command-line tool enables forensic Investigator to establish communication between an Android device and a forensic workstation in order to perform data acquisition from the device?
Which of the following tools will allow a forensic Investigator to acquire the memory dump of a suspect machine so that It may be Investigated on a forensic workstation to collect evidentiary data like processes and Tor browser artifacts?