This CHFI certification quiz is on forensics and network intrusion! When someone gains access to a network and its data without permission, there is a lot that they can do to it, and this is including but not limited to deleting, changing or sharing the data. As a certified forensic, you should be able to trace this intrusion and mark where it is from. Try out the quiz and see if you can.
Net file
PsFile
Openfiles
Open files
Ipconfig
Nbtstat
Netstat
Ifconfig
Volatile Extractor
Volatility Framework
Volatility Extractor
Volatile Framework
Both application and boot prefetching are enabled.
Application prefetching is enabled.
Boot prefetching is enabled.
Prefetching is disabled.
Both application and boot prefetching are enabled.
Prefetching is disabled.
Boot prefetching is enabled.
Application prefetching is enabled.
Regedit
EventViewer
Wevtutil
Msconfig
Log reduction
Log compression
Log conversion
Log generation
Log creation and storage
Log viewing
Log analysis
Log protection and availability
Eavesdropping
Phishing
Social engineering
Spamming
Text file
Application data
Executable file
DNA sample
Real-time analysis
Past-time analysis
Premortem
Postmortem
Spoofing
Enumeration
Eavesdropping
Bottleneck
HIPAA
FISMA
GLBA
PCI DSS
PCI DSS
HIPAA
FISMA
GLBA
GLBA
PCI DSS
SOX
FISMA
Access denied to normally available web services
Web pages redirected to an unknown website
Network performance being unusually slow
Logs found to have no known anomalies
MDF
NDF
LDF
TXTX
EVTX
.log
.txt
Web server layer
Client layer
Database layer
Business layer
Business layer
Web server layer
Client layer
Database layer
Information leakage
Buffer overflow
SQL injection
Cookie poisoning
SQL injection
Cookie poisoning
Information leakage
Buffer overflow
Broken account management
Cookie poisoning
SQL injection
Buffer overflow
Buffer overflow
SQL injection
Cookie poisoning
Denial-of-service
Cookie poisoning
Buffer overflow
SQL injection
Denial-of-service
Wait!
Here's an interesting quiz for you.