CHFI Certification Test: Forensics And Network Intrusion! Trivia Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dale
D
Dale
Community Contributor
Quizzes Created: 6 | Total Attempts: 4,377
| Attempts: 483 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. What replaces legacy BIOS firmware interfaces and uses a partition interfacing system to overcome the limitations of the MBR partitioning scheme?

Explanation

UEFI (Unified Extensible Firmware Interface) replaces legacy BIOS firmware interfaces and uses a partition interfacing system to overcome the limitations of the MBR partitioning scheme. UEFI provides a more advanced and flexible interface for the firmware on modern computers. It supports larger disk sizes, faster boot times, and more secure booting processes. UEFI also allows for the use of GPT (GUID Partition Table) partitioning scheme, which can support larger disk capacities and more partitions compared to the older MBR scheme.

Submit
Please wait...
About This Quiz
CHFI Certification Test: Forensics And Network Intrusion! Trivia Quiz - Quiz

Are you reading for the CHFI certification test? The trivia quiz below is on forensics, and network intrusion is perfect for helping you review just how conversant you... see moreare with the topic. Think you can handle it? How about you give it a try and get to see just how much you might remember in the process. All the best! see less

2. Which of the following is NOT a common computer file system?

Explanation

not-available-via-ai

Submit
3. Which of the following is a 128-bit unique number, generated by the Windows OS for identifying a specific device, document, database entry, or user?

Explanation

A Globally Unique Identifier (GUID) is a 128-bit unique number generated by the Windows OS for identifying a specific device, document, database entry, or user. It is used to ensure that each identifier is unique worldwide, reducing the chances of duplication. GUIDs are commonly used in various applications and systems to uniquely identify entities and provide a reliable way to reference them.

Submit
4. What is a hard disk's first sector that specifies the location of an operating system for the system to load into the main storage?

Explanation

The Master Boot Record (MBR) is the first sector of a hard disk that contains information about the disk's partition table and the location of the operating system. It is responsible for loading the operating system into the main storage of the system. The MBR also contains a small program called the boot loader, which helps initiate the booting process.

Submit
5. Which of the following Windows operating systems powers on and starts up using only the traditional BIOS-MBR method?

Explanation

Windows Vista is the correct answer because it is the only operating system listed that powers on and starts up using only the traditional BIOS-MBR method. Windows 9, Windows 8, and Windows 10 all use the newer UEFI-GPT method for booting up.

Submit
6. Which of the following is NOT part of the Computer Forensics Investigation Methodology?

Explanation

Testifying as an expert defendant is not part of the Computer Forensics Investigation Methodology. Computer forensics involves the collection and analysis of digital evidence to investigate and prevent cybercrime. Testifying as an expert witness, on the other hand, is an essential part of the methodology as it involves presenting findings and expert opinions in a court of law.

Submit
7. Which commands help create MBR in Windows and DOS operating systems?

Explanation

The FDISK/MBR commands are used to create the Master Boot Record (MBR) in Windows and DOS operating systems. The MBR is a special type of boot sector located at the beginning of a storage device, such as a hard drive, and contains the necessary information for the system to start up. FDISK is a command-line utility that allows users to create, delete, and manage disk partitions, while MBR stands for Master Boot Record, which is responsible for loading the operating system. Therefore, using FDISK/MBR commands is the correct way to create the MBR in Windows and DOS operating systems.

Submit
8. Which of the following describes when the user restarts the system via the operating system?

Explanation

Warm booting refers to the process of restarting the system through the operating system without turning off the power to the computer. This allows the system to reset and start fresh without going through the complete startup process. It is called "warm" booting because the system is already powered on and only the software is being restarted. This is different from cold booting, where the system is completely powered off and then turned on again. Hard booting and hot booting are not accurate descriptions for restarting the system via the operating system.

Submit
9. What is the role of an expert witness?

Explanation

An expert witness plays a crucial role in a court case by providing specialized knowledge and expertise on a particular subject matter. They are responsible for educating both the public and the court about complex issues, presenting evidence, and offering their professional opinion. Their primary focus is to provide unbiased and objective information to assist the court in making informed decisions. They do not support the defense or testify against the plaintiff, as their role is to provide impartial and factual information to aid in the legal process.

Submit
10. Which of the following is a computer-created source of potential evidence?

Explanation

A swap file is a computer-created source of potential evidence. It is a file on a computer's hard drive that is used to temporarily store data that cannot fit into the computer's random access memory (RAM). When the RAM is full, the operating system moves some of the data from RAM to the swap file. This file can contain valuable information such as recently accessed files, internet browsing history, and other activities performed on the computer. Therefore, it can serve as a potential source of evidence in computer forensic investigations.

Submit
11. Which of the following is NOT an advantage of SSDs over HDDs?

Explanation

SSDs (Solid State Drives) have non-volatile memory, which means that the data stored in them is not lost when the power is turned off. This is an advantage because it ensures that the data remains intact even during power outages or system failures. However, non-volatile memory is not an advantage of SSDs over HDDs. HDDs also have non-volatile memory, as they store data magnetically on rotating disks. Therefore, non-volatile memory is not a distinguishing advantage of SSDs over HDDs.

Submit
12. Which of the following is a consideration of HDDs but not SSDs?

Explanation

The correct answer is RPM speed. RPM speed refers to the rotational speed of the hard disk drive's platters. HDDs have spinning platters, while SSDs do not. Since SSDs do not have moving parts, they do not have an RPM speed. Access time, seek time, and transfer time are considerations for both HDDs and SSDs.

Submit
13. Under which of the following circumstances has a court of law allowed investigators to perform searches without a warrant?

Explanation

not-available-via-ai

Submit
14. Forensic readiness refers to:

Explanation

Forensic readiness refers to an organization's ability to effectively utilize digital evidence within a short timeframe and with minimal expenses for investigation. This means that the organization is prepared to collect, preserve, and analyze digital evidence in a manner that is efficient and cost-effective. By being forensic ready, the organization can enhance its ability to investigate and respond to incidents, ultimately improving the prospects of successful legal action if necessary.

Submit
15. Which of the following is TRUE of cybercrimes?

Explanation

In cybercrimes, investigators can only forcibly seize the computing devices if they have a warrant. This means that they have legal permission to take the devices without the owner's consent. This is an important step in the investigation process as it allows investigators to secure the evidence and prevent the suspect from tampering with or hiding it. It also ensures that the evidence is legally obtained and can be admissible in court.

Submit
16. Which of the following should be physical location and structural design considerations for forensics labs?

Explanation

Forensics labs require a controlled environment to prevent any external influences on the evidence being analyzed. Having no windows in the lab exteriors ensures that natural light, temperature, and sound can be regulated effectively. This helps in maintaining the integrity of the evidence and preventing any contamination or tampering. Additionally, it also ensures the privacy and security of the lab, as sensitive information and activities are not exposed to outside view.

Submit
17. Which of the following Windows operating systems powers on and starts up using either the traditional BIOS-MBR method or the newer UEFI-GPT method?

Explanation

Windows 8 is the correct answer because it is the first Windows operating system to support both the traditional BIOS-MBR method and the newer UEFI-GPT method for powering on and starting up. This means that Windows 8 can be installed and run on older devices that use the traditional BIOS-MBR method, as well as newer devices that use the UEFI-GPT method.

Submit
18. Which field type refers to the volume descriptor as a set terminator?

Explanation

Field type number 255 refers to the volume descriptor as a set terminator. This means that when this field type is encountered in a volume descriptor set, it signifies the end of the set. It is used to mark the last descriptor in the set and indicates that there are no more descriptors following it.

Submit
19. Which of the following should be work area considerations for forensic labs?

Explanation

The correct answer is "Examiner station has an area of about 50–63 square feet." This statement suggests that the work area for forensic labs should have a designated space specifically for examiners, which should be spacious enough to accommodate their work requirements. Having a defined area helps ensure that examiners have enough room to work comfortably and efficiently, allowing them to perform their tasks effectively.

Submit
20. Which of the following is NOT an objective of computer forensics?

Explanation

The objective of computer forensics is to identify, gather, and preserve the evidence of a cybercrime, interpret, document, and present the evidence to be admissible during prosecution, and track and prosecute the perpetrators in a court of law. Mitigating vulnerabilities to prevent further loss of intellectual property, finances, and reputation during an attack is not an objective of computer forensics, as it falls under the domain of cybersecurity and risk management.

Submit
21. Which file system for Linux transfers all tracks and boot images on a CD as normal files?

Explanation

CDFS stands for Compact Disc File System, which is a file system used for reading and accessing data from CDs. Unlike other file systems like CIFS, NTFS, and VMFS, CDFS treats all tracks and boot images on a CD as normal files. This means that the tracks and boot images can be accessed and transferred just like any other file on the CD, making it easier to work with CDs in Linux.

Submit
22. Which of the following is a user-created source of potential evidence?

Explanation

An address book is a user-created source of potential evidence because it is a personal contact list that is created and maintained by the user. It contains information such as names, phone numbers, and email addresses of individuals, which can be valuable evidence in investigations or legal proceedings. Unlike printer spool, cookies, and log files, which are system-generated or automatically created by software, an address book is actively managed and updated by the user, making it a user-created source of potential evidence.

Submit
23. Which of the following is an advantage of the GPT disk layout?

Explanation

The advantage of the GPT disk layout is that it allows users to partition disks larger than 2 terabytes. This means that GPT is capable of handling larger storage capacities, making it more suitable for modern storage needs. Compared to MBR, GPT offers a more advanced and flexible partitioning system that can accommodate larger disk sizes.

Submit
24. Which of the following basic partitioning tools displays details about GPT partition tables in Macintosh OS?

Explanation

Disk Utility is the correct answer because it is a basic partitioning tool that is specifically designed for Macintosh OS. It allows users to manage and manipulate GPT (GUID Partition Table) partition tables on Mac systems. Disk Utility provides detailed information about the GPT partition tables, such as the partition layout, size, type, and file system format. It also offers various partitioning and formatting options, allowing users to create, resize, delete, and format partitions on their Macintosh systems.

Submit
25. Which field type in a volume descriptor refers to a boot record?

Explanation

The field type in a volume descriptor that refers to a boot record is Number 0.

Submit
26. Under which of the following conditions will duplicate evidence NOT suffice?

Explanation

Duplicate evidence will not suffice when the original evidence is in possession of the originator because the original evidence is considered to be the most reliable and authentic source of information. In this case, relying on duplicate evidence would not be sufficient as it may lack the credibility and integrity of the original evidence. Therefore, it is necessary to have access to the original evidence in order to ensure accuracy and reliability.

Submit
27. What are the essential Windows system files?

Explanation

Ntoskrnl.exe is one of the essential Windows system files. It is the kernel image for the Windows NT operating system. This file is responsible for various core functions, such as memory management, process and thread management, and input/output operations. It is loaded during system startup and remains in memory throughout the operating system's operation. Without this file, the Windows operating system would not be able to function properly.

Submit
28. On Macintosh computers, which architecture utilizes Open Firmware to initialize the hardware interfaces after the BootROM performs POST?

Explanation

PowerPC is the correct answer because on Macintosh computers, the PowerPC architecture utilizes Open Firmware to initialize the hardware interfaces after the BootROM performs POST. Open Firmware is a standard firmware interface that provides a platform-independent way to boot the computer and configure hardware. It is commonly used on PowerPC-based systems, including older Macintosh computers.

Submit
29. How many tracks are typically contained on a platter of a 3.5″ HDD?

Explanation

A typical platter of a 3.5" HDD typically contains 1,000 tracks.

Submit
30. How many bits are used by the MBR partition scheme for storing LBAs (Logical Block Addresses) and the size information on a 512-byte sector?

Explanation

The MBR partition scheme uses 32 bits to store LBAs (Logical Block Addresses) and the size information on a 512-byte sector. This means that it can support a maximum of 2^32 (or 4,294,967,296) LBAs, which is the maximum number of sectors that can be addressed using this scheme.

Submit
31. What do GPTs use instead of the addressing used in modern MBRs?

Explanation

GPTs (GUID Partition Tables) use Logical Block Addressing (LBA) instead of the addressing used in modern MBRs. LBA is a method of disk addressing that allows for direct access to specific blocks of data on a storage device, such as a hard drive. It uses a linear addressing scheme, where each block is assigned a unique logical block address. This allows for more efficient and flexible disk management compared to the traditional Cylinder-Head-Sector (CHS) addressing used in MBRs.

Submit
32. Which of the following file systems are used for adding more descriptors to a CD-ROM's file system sequence?

Explanation

Joliet and UDF are file systems used for adding more descriptors to a CD-ROM's file system sequence. Joliet is an extension of the ISO 9660 file system and allows for longer file names and Unicode characters. UDF, on the other hand, is a universal file system that supports various operating systems and allows for more advanced features like file compression and encryption. By using Joliet and UDF, additional descriptors can be added to enhance the functionality and compatibility of the CD-ROM's file system.

Submit
33. Which of the following is one of the five UEFI boot process phases?

Explanation

The correct answer is DXE Phase. The UEFI boot process consists of five phases: SEC (Security), PEI (Pre-EFI Initialization), DXE (Driver Execution Environment), BDS (Boot Device Selection), and RT (Runtime). The DXE Phase is responsible for executing the UEFI drivers and initializing the UEFI services, allowing the operating system to be loaded and executed.

Submit
34. Which partition type designates the protective MBR from legacy MBR?

Explanation

The partition type 0xEE designates the protective MBR from legacy MBR. This partition type is used on a GPT (GUID Partition Table) disk to indicate the presence of a protective MBR, which helps prevent older operating systems from mistakenly treating the disk as unpartitioned or damaged. The protective MBR contains a single partition that spans the entire disk, effectively protecting the GPT partition table.

Submit
35. Which logical drive holds the information regarding the data and files that are stored in the disk?

Explanation

An extended partition is a type of logical drive that holds information regarding the data and files stored on a disk. It is used to create additional logical drives within a primary partition. The extended partition allows for better organization and management of data on the disk by dividing it into smaller logical drives.

Submit
36. Which of the following is one of the five UEFI boot process phases?

Explanation

The SEC Phase is one of the five UEFI boot process phases. SEC stands for Security Phase and it is the initial phase of the boot process where the firmware initializes and verifies the platform's security features. This phase ensures that the platform is secure and trusted before proceeding to the next phases of the boot process.

Submit
37. How many bytes is each partition entry in GPT?

Explanation

Each partition entry in GPT is 128 bytes.

Submit
38. Which of the following is a small piece of instruction in computer language, which the system loads into the BIOS and executes to initiate the system's boot process?

Explanation

The correct answer is "Master Boot Code". The master boot code is a small piece of instruction in computer language that is loaded into the BIOS (Basic Input/Output System) and executed to initiate the system's boot process. It is responsible for locating the operating system's boot loader and starting the system.

Submit
39. Which of the following items is used to describe the characteristics of the file system information present on a given CD-ROM?

Explanation

A volume descriptor is used to describe the characteristics of the file system information present on a given CD-ROM. It contains important information about the volume, such as its size, type, and file system used. This descriptor helps the operating system understand how to read and access the files stored on the CD-ROM. It provides essential metadata that allows the system to properly navigate and interpret the file system structure on the CD-ROM.

Submit
40. Which of the following is one of the five UEFI boot process phases?

Explanation

The RT Phase is one of the five UEFI boot process phases. UEFI (Unified Extensible Firmware Interface) is a specification that defines a software interface between the operating system and the platform firmware. The RT Phase stands for Runtime Phase, which occurs after the pre-boot phase and involves the execution of UEFI drivers and applications in the operating system runtime environment. This phase allows for the initialization of hardware devices, configuration of system settings, and the loading of additional software components required for the operating system to run properly.

Submit
41. The UEFI assigns how many bytes for the Partition Entry Array?

Explanation

The UEFI assigns 16,384 bytes for the Partition Entry Array.

Submit
42. Which item describes the following UEFI boot process phase?  (The phase of EFI consisting of interpreting the boot configuration data, selecting the Boot Policy for later implementation, working with the prior phase to check if the device drivers require signature verification, loading either MBR boot code into memory for Legacy BIOS Boot or the Bootloader program from the EFI partition for UEFI Boot, and providing an option for the user to choose EFI Shell or an UEFI application as the Boot Device from the Setup.)

Explanation

The correct answer is BDS (Boot Device Selection) Phase. This phase of the UEFI boot process involves interpreting the boot configuration data, selecting the Boot Policy, checking device drivers for signature verification, and loading either the MBR boot code for Legacy BIOS Boot or the Bootloader program from the EFI partition for UEFI Boot. It also provides the user with an option to choose EFI Shell or a UEFI application as the Boot Device from the Setup.

Submit
43. Which of the following is NOT a disk editor tool to help view file headers and important information about a file?

Explanation

Win Edit is not a disk editor tool to help view file headers and important information about a file. The other options listed, Disk Edit, WinHex, and Hex Workshop, are all well-known disk editor tools that provide the functionality mentioned.

Submit
44. Which item describes the following UEFI boot process phase?  (The phase of EFI consisting of initializing the CPU, temporary memory, and boot firmware volume (BFV); locating and executing the chapters to initialize all the found hardware in the system; and creating a Hand-Off Block List with all found resources interface descriptors.)

Explanation

The correct answer is PEI (Pre-EFI Initialization) Phase. This phase of the UEFI boot process involves initializing the CPU, temporary memory, and boot firmware volume (BFV). It also includes locating and executing the chapters to initialize all the found hardware in the system. Additionally, it creates a Hand-Off Block List with all found resources interface descriptors.

Submit
45. Which of the following Federal Rules of Evidence states that the court shall restrict the evidence to its proper scope and instruct the jury accordingly?

Explanation

Rule 105 of the Federal Rules of Evidence states that the court shall restrict the evidence to its proper scope and instruct the jury accordingly. This means that the court has the responsibility to ensure that only relevant and admissible evidence is presented to the jury, and to provide instructions to the jury on the proper use and interpretation of that evidence. By doing so, the court helps to ensure a fair and just trial.

Submit
46. Which cmdlet can investigators use in Windows PowerShell to analyze the GUID Partition Table data structure of the hard disk?

Explanation

Get-GPT is the correct answer because it is a cmdlet in Windows PowerShell that investigators can use to analyze the GUID Partition Table (GPT) data structure of the hard disk. GPT is a standard for partitioning a hard drive and is commonly used in modern computers with UEFI firmware. By using the Get-GPT cmdlet, investigators can retrieve information about the partitions, volumes, and other metadata stored in the GPT, allowing them to analyze and understand the disk's layout and organization.

Submit
47. Which LBA contains the GPT header?

Explanation

The GPT header is located in LBA 1.

Submit
48. Which cmdlet can investigators use in Windows PowerShell to analyze the GUID Partition Table to find the exact type of boot sector and display the partition object?

Explanation

Get-PartitionTable is the correct answer because it is a cmdlet in Windows PowerShell that can be used by investigators to analyze the GUID Partition Table. This cmdlet allows them to find the exact type of boot sector and display the partition object, providing valuable information for their investigation.

Submit
49. Which field type refers to the volume descriptor as a supplementary?

Explanation

Field type number 2 refers to the volume descriptor as a supplementary.

Submit
50. Which of the following Federal Rules of Evidence ensures that the truth may be ascertained and the proceedings justly determined?

Explanation

Rule 102 of the Federal Rules of Evidence states that these rules should be construed to secure fairness in administration, eliminate unjustifiable expense and delay, and promote the development of evidence law to achieve the truth and just determination of proceedings. This means that Rule 102 ensures that the truth may be ascertained and the proceedings justly determined, making it the correct answer to the question.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 18, 2019
    Quiz Created by
    Dale
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What replaces legacy BIOS firmware interfaces and uses a partition...
Which of the following is NOT a common computer file system?
Which of the following is a 128-bit unique number, generated by the...
What is a hard disk's first sector that specifies the location of an...
Which of the following Windows operating systems powers on and starts...
Which of the following is NOT part of the Computer Forensics...
Which commands help create MBR in Windows and DOS operating systems?
Which of the following describes when the user restarts the system via...
What is the role of an expert witness?
Which of the following is a computer-created source of potential...
Which of the following is NOT an advantage of SSDs over HDDs?
Which of the following is a consideration of HDDs but not SSDs?
Under which of the following circumstances has a court of law allowed...
Forensic readiness refers to:
Which of the following is TRUE of cybercrimes?
Which of the following should be physical location and structural...
Which of the following Windows operating systems powers on and starts...
Which field type refers to the volume descriptor as a set terminator?
Which of the following should be work area considerations for forensic...
Which of the following is NOT an objective of computer forensics?
Which file system for Linux transfers all tracks and boot images on a...
Which of the following is a user-created source of potential evidence?
Which of the following is an advantage of the GPT disk layout?
Which of the following basic partitioning tools displays details about...
Which field type in a volume descriptor refers to a boot record?
Under which of the following conditions will duplicate evidence NOT...
What are the essential Windows system files?
On Macintosh computers, which architecture utilizes Open Firmware to...
How many tracks are typically contained on a platter of a 3.5″...
How many bits are used by the MBR partition scheme for storing LBAs...
What do GPTs use instead of the addressing used in modern MBRs?
Which of the following file systems are used for adding more...
Which of the following is one of the five UEFI boot process phases?
Which partition type designates the protective MBR from legacy MBR?
Which logical drive holds the information regarding the data and files...
Which of the following is one of the five UEFI boot process phases?
How many bytes is each partition entry in GPT?
Which of the following is a small piece of instruction in computer...
Which of the following items is used to describe the characteristics...
Which of the following is one of the five UEFI boot process phases?
The UEFI assigns how many bytes for the Partition Entry Array?
Which item describes the following UEFI boot process phase? ...
Which of the following is NOT a disk editor tool to help view file...
Which item describes the following UEFI boot process phase? ...
Which of the following Federal Rules of Evidence states that the court...
Which cmdlet can investigators use in Windows PowerShell to analyze...
Which LBA contains the GPT header?
Which cmdlet can investigators use in Windows PowerShell to analyze...
Which field type refers to the volume descriptor as a supplementary?
Which of the following Federal Rules of Evidence ensures that the...
Alert!

Advertisement