Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CHFI Module 2 Exam With Complete Solutions Latest Update

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
11-11-2024
Written in
2024/2025

CHFI Module 2 Exam With Complete Solutions Latest Update...

Institution
CHFI Module 2
Course
CHFI Module 2

Content preview

CHFI Module 2 Exam With Complete Solutions
Latest Update


Computer forensics investigation - ANSWER Any forensic investigation which involves
computer in one way or another, the investigation is coined as Computer Forensic
Investigation. Development of technology from the last two decades is so rapid that it
made lot easier for criminals to hide information about their crimes. The advantage the
investigators have is that any type of Computer Crime results in some type of clue and
evidence stored on computer but still there are number of Cyber Crimes, which require
Computer Forensic investigation, some of them are as follows:

Unauthorized access

Property theft (misuse of information)

Forgery

Privacy breach

Computer fraud

Child pornography

While investigating computer crime, the investigator has to first find that an incident has
taken place and then he assesses its impact. Incident: Any event that is not part of the
standard operation of a service and which causes or may cause an interruption to, or a
reduction in, the quality of service. An incident threatens the security of the computer
system or network of any organization. The investigator has to verify the complaints
relating to intrusion as some of them may turn out to be hoax calls. So far as the
intrusion detection system alert is concerned, it can only indicate an attempted and
unsuccessful intrusion, or it may also be a false alarm. Thus, the investigator should
analyze the strengths and weaknesses concerning the sources and include the human
factors along with digital factors. He/she should conduct preliminary assessment in
order to search for the evidence. Thereafter, he/she should search and seize the
computer's equipment and gather evidence that one can present in the court of law or
during a corporate inquiry.

Requirements for an investigation - ANSWER Pre-investigation The investigator should,
prior to the investigation, do the following:

Create a workstation and data recovery lab

Create investigating team.

,Alliance with a local district attorney.

Review the policies and laws

Inform the decision makers and obtain authorization

Analyze the risks.

Create a computer investigation toolkit.

Define the methodology.



Build a forensic workstation - ANSWER Before building a forensic workstation,
computer forensics approach should be clearly defined. The computer forensics
workstation should have facilities and tools that can perform the following functions:

Support hardware-based local and remote network drive duplication.

Validate the image and the file's integrity.

Identify the date and time when the files have been modified, accessed, or created.

Identify the deleted files.

Support the removable media.

Isolate and Analyze Free Drive Space



Form an Investigation Team - ANSWER Following are some of the points that the
investigator should keep in mind while building an investigation team:

Keep the team as small as possible to maintain confidentiality and protect the
organization against unwanted information leaks.

Find out who the person is who would respond to an incident for effectively conducting
an internal computer investigation.

Ensure that the concerned authority grants each team member with the needed
clearances and permissions to perform assigned activities

Nominate team members and decide upon the responsibility of each team member

Hire an external investigation team comprising experts your organization lacks.

Make one team member responsible for the technical lead of the investigation

People involved in computer forensics - ANSWER People involved in computer forensics
are as follows:

, Expert witness: An expert witness provides formal opinion as testimony in the court of
law.

Evidence manager: The work of an evidence manager is to manage the evidence in such
a way that it will be admissible in the court of law.

Evidence documenter: An evidence documenter documents all the evidence and the
phases present in the investigation process

Evidence examiner/investigator: Evidence examiner/ investigator examines the
evidence acquired and sorts out the useful evidence.

Incident analyzer: An incident analyzer analyzes on the basis of occurrence.

Decision maker: A decision maker is responsible for authorization of a policy or
procedure for investigating the process.

Incident responder: An incident responder is responsible for the measure to be taken
when an incident occurs.

Photographer: A photographer takes photographs of the crime scene and the evidence
gathered.

Attorney: An attorney gives legal advice.



Review policies and laws - ANSWER Review policies and laws include the following:

Understand the laws: Before commencing with the process of investigation, it is
essential to understand the laws that would be applicable regarding the investigation
process along with the internal organization's policies.

Identify possible issues: This includes identifying possible issues which are relevant to
applicable Federal statutes, State statutes as well as local policies and laws.

Best practices: Best practices include the following:

Establish the extent of authority to search.

Identify legislation that may provide authority to investigate.

Seek the advice from a counsel when specific issues are identified to avoid mishandling
the investigation

Ensure the customer's privacy and confidentiality.



Forensics laws - ANSWER Different forensics laws are as follow:

Written for

Institution
CHFI Module 2
Course
CHFI Module 2

Document information

Uploaded on
November 11, 2024
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$15.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Thumbnail
Package deal
CHFI PACKAGED EXAMS!!!
-
6 2024
$ 91.44 More info

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Chrisyuis West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
11
Member since
1 year
Number of followers
2
Documents
1610
Last sold
1 day ago

5.0

3 reviews

5
3
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions