CHFI v3 Sample Test Questions
CHFI v3 Sample Test Questions
CHFI v3 Sample Test Questions
A. Francis Galton *
B. Hans Gross
C. Benjamin Franklin
D. Francis Eghart
A. Latent Data *
B. Archival Data *
C. Active Data *
D. Passive Data
E. Inactive Data
A. Industrial espionage *
B. Copyright infringement
C. Physical theft
D. Denial of Service attacks
6. Under United States Penal Code 18 U.S.C 1831 for Economic Espionage, what is the
maximum fine allowed by law?
A. $10,000,000 USD *
B. $1,000,000 USD
C. $100,000 USD
D. $5,000,000 USD
8. For computer crimes in the United States, which two agencies share jurisdiction for
computer crimes that cross state lines? (Select 2)
A. FBI *
B. Secret Service *
C. ATF
D. NSA
A. Search warrant *
B. Subpoena
C. Habeas corpus
D. Modus operandi
10. What command can be used to view the current network connections on a computer?
A. Netstat *
B. Arp
C. Dir /p
D. Finger
11. What method of copying should always be performed first before carrying out an
investigation?
A. Bit-stream copy *
B. Parity-bit copy
C. Parity-stream copy
D. Xcopy
12. Why should you never power on a computer that you need to acquire digital evidence
from?
A. When the computer boots up, files are written to the computer rendering the data
“unclean” *
B. When the computer boots up, the system cache is cleared which could destroy
evidence
C. When the computer boots up, data in the memory’s buffer is cleared which could
destroy evidence
D. Powering on a computer has no affect when needing to acquire digital evidence from
it
13. Why would a company issue a dongle with the software they sell?
14. What is the first step taken in an investigation for laboratory forensic staff members?
15. When marking evidence that has been collected with the “aaa/ddmmyy/nnnn/zz”
format, what does the “nnnn” denote?
16. When discussing the chain of custody in an investigation, what does a “link” refer to?
A. Gaps in the firewall log with no activity, when there is normally activity *
B. Numerous successful login attempts
C. Seeing spikes in network activity throughout the workday
D. Hard drive failure on a SQL server machine
A. Network Administrator *
B. Security Administrator
C. Director of Information Technology
D. Director of Administration
19. What stage of the incident handling process involves reporting events?
A. Identification *
B. Follow-up
C. Containment
D. Recovery
20. Which category of incidents can be handled within one working day?
21. How many entrances are recommended for a computer forensics lab?
A. One *
B. Three
C. Two
D. Four
A. Wireless cards *
B. Backup tapes
C. Hard drives
D. PDA’s
23. Paraben’s Lockdown device uses which operating system to write hard drive data?
A. Windows *
B. Red Hat
C. Unix
D. Mac OS
24. Why does Computer Forensic Labs, Inc. not recommend that companies search for
evidence themselves?
A. Sector *
B. Cluster
C. Track
D. Platter
26. When operating systems mark a cluster as used but not allocated, the cluster is
considered what?
A. Lost *
B. Bad
C. Corrupt
D. Unallocated
27. Given the drive dimensions as follows and assuming a sector has 512 bytes, what is
the capacity of the described hard drive?
22,164 cylinders/disk
80 heads/cylinder
63 sectors/track
A. 53.26 GB *
B. 57.19 GB
C. 11.17 GB
D. .10 GB
A. 700 MB *
B. 850 MB
C. 1.44 GB
D. 550 MB
A. 50 GB *
B. 27 GB
C. 40 GB
D. 75 GB
A. SHA-1 *
B. RC5
C. MD5
D. AES
32. When preparing an investigative report, what sources provide examples of expert
witnesses’ previous testimonies?
A. Deposition banks *
B. Testimony banks
C. Subpoena banks
D. Court docket banks
33. For forensic investigative reports, what electronic format should reports be sent in?
A. PDF *
B. DOC
C. WPD
D. TIFF
A. Lay witness *
B. Material witness
C. Clerk-appointed witness
D. Bonded witness
A. Legal-sequential numbering *
B. Decimal numbering structure
C. Forensic-sequential numbering
D. Binary-sequential numbering
36. In a court of law, who is qualified by the court to address the behavior of the
defendant or characteristics of a crime?
A. Victim advocate *
B. Legal counsel for defendant
C. Legal counsel for prosecution
D. No one is qualified
37. This type of testimony is presented by someone who does the actual fieldwork and
does not offer a view in court.
A. Technical testimony *
B. Expert testimony
C. Victim advocate testimony
D. Civil litigation testimony
38. When should an MD5 hash check be performed when processing evidence?