Spring Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 5
Total 45 questions
Exam Code: 312-49v11                Update: Mar 27, 2026
Exam Name: Computer Hacking Forensic Investigator (CHFIv11)

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Exam Dumps: Updated Questions & Answers (March 2026)

Question # 1

During a forensic investigation of a compromised Windows system, Investigator Sarah is tasked with extracting artifacts related to the system'spagefile.sys. She needs to navigate through the registry to locate this specific information. Which of the following registry paths should Sarah examine to extract pagefile.sys artifacts from the system?

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

B.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Windows

C.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName

D.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management

Question # 2

Following a cybercrime incident, a forensic investigator is conducting a detailed examination of a suspect’s digital device. The investigator needs to preserve and analyze the disk images without being restricted by various image file formats tied to commercial software, which may limit the investigator's ability to work with a range of analysis platforms. The investigator chooses a simple, straightforward, and uncompressed format that can be easily accessed and analyzed using a wide range of forensic tools and platforms, without the need for specialized software. Which data acquisition format should the investigator use in this case?

A.

Adopt the raw format that is commonly used in digital evidence investigations.

B.

Choose the AFF4 format, which offers advanced features for comprehensive analysis.

C.

Employ the advanced forensics format for storing metadata and disk images.

D.

Use a proprietary format that is compatible with specific commercial software.

Question # 3

During a routine digital investigation, forensic analysts suspect that sensitive information may be hidden within seemingly innocuous files. Despite extensive scanning and analysis, they are unable to detect any abnormalities using conventional surveillance techniques.

What technique might attackers use to hide sensitive information within seemingly normal files, making it difficult for forensic investigators to detect?

A.

Trial obfuscation

B.

Hiding data in file system structures

C.

File extension mismatch

D.

Steganography

Question # 4

During a forensic investigation into suspicious activities within an organization's AWS environment, the investigator uses Amazon CloudWatch to adjust the storage duration of specific log data sets. This action is crucial for managing the lifespan of logs and ensuring that critical logs are preserved for further analysis during the investigation. Which feature of Amazon CloudWatch is the investigator using in this scenario?

A.

Analyzes and monitors systems and applications through the log data.

B.

Searches and analyzes log data efficiently using CloudWatch Logs Insights.

C.

Modifies retention policies for individual log groups.

D.

Sets notification alerts for specific API activities for further investigation and troubleshooting.

Question # 5

Hazel, a forensic investigator, is analyzing the SSH logs on a Linux server usingjournalctl. She needs to extract thefingerprint of the SSH keyfrom the logs to trace any potential unauthorized access. Which of the following commands should Hazel execute to view the SSH key fingerprint in the SSH unit logs?

A.

journalctl -u ssh --since yesterday

B.

journalctl -fu ssh

C.

journalctl -u ssh --since -1h

D.

journalctl -u ssh

Question # 6

Lucas, a forensics expert, was extracting artifacts related to the Tor browser from a memory dump obtained from a victim’s system. During his investigation, he used a forensic tool to extract relevant information and noticed that the dump contained the least possible number of artifacts as evidence. Based on his observations, which of the following conditions resulted in the least number of artifacts being found in the memory dump?

A.

Tor browser opened

B.

Tor browser uninstalled

C.

Tor browser closed

D.

Tor browser installed

Question # 7

In a digital forensic lab, rigorous validation of software and hardware tools ensures precision. Adherence to industry standards, regular maintenance, and continuous training uphold excellence. Accreditations such asASCLD/LABandISO/IEC 17025validate the lab’s reliability and credibility.

What is crucial for ensuringprecision and reliabilityin a digital forensic laboratory?

A.

Regular equipment maintenance

B.

All of these

C.

Adherence to industry standards

D.

Continuous investigator training

Question # 8

Amelia, a cloud security analyst, is investigating a security breach in a cloud-based system where an adversary has managed to execute malicious code within the cloud environment. The attack was executed by intercepting and manipulating a SOAP message during transmission, duplicating the body of the message, and sending it to the server as though it was from a legitimate user. This manipulation resulted in the adversary gaining unauthorized access to the cloud system. What type of cloud-based attack did the adversary perform in this situation?

A.

Domain sniffing

B.

Cybersquatting

C.

Domain hijacking

D.

Wrapping attack

Question # 9

In a complex cybercrime investigation, forensic experts encounter a severely fragmented hard drive that lacks usable file system metadata. By employing advanced file carving techniques, they successfully recover crucial evidence hidden by a suspect who deliberately manipulated file extensions to obfuscate data.

What advanced method do forensic investigators employ to recover hidden files from a fragmented hard drive lacking file system metadata?

A.

Reconstructing the file system architecture from scratch.

B.

Decrypting files encrypted using sophisticated algorithms.

C.

Extracting files from inaccessible sectors using firmware-level access.

D.

Analyzing file signatures and patterns in unallocated space.

Question # 10

As a malware analyst, you're tasked with scrutinizing a suspicious program on a Windows workstation, particularly focusing on its interactions with system registry files. Monitoring registry artifacts provides insights into malware behavior, aiding in identifying persistence mechanisms and malicious activities. How do forensic investigators gain insights into malware behavior on Windows systems by monitoring registry artifacts?

A.

Monitoring network traffic patterns

B.

Reviewing browser history logs

C.

Tracking system file executions

D.

Analyzing registry key modifications

Page: 1 / 5
Total 45 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 27 Mar 2026