CHFI V10 Quiz Questions and Answers

Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration, and critical system files and execute commands outside of the web server's root directory?

Answer :
  • Directory traversal

Which among the following is an act passed by the U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations?

Answer :
  • SOX

Which password cracking technique uses every possible combination of character sets?

Answer :
  • Brute force attack

An expert witness is a ____________ who is normally appointed by a party to assist the formulation and preparation of a party’s claim or defense. and preparation of a party’s claim or defense.

Answer :
  • Subject matter specialist

Amber, a black hat hacker, has embedded malware into a small enticing advertisement and posted it on a popular ad network that displays across various websites. What is she doing?

Answer :
  • Malvertising

Which of the following are small pieces of data sent from a website and stored on the user's computer by the user's web browser to track, validate, and maintain specific user information?

Answer :
  • Cookies

Which of the following is a part of a Solid-state drive (SSD)?

Answer :
  • NAND based flash memory

Which one of the following is the main objective of computer forensics?

Answer :
  • To track and prosecute cybercriminals

Which of the following is Computer forensics done to?

Answer :
  • Gather Evidence

Which among these definitions is a proper meaning of a cybercrime?

Answer :
  • Any illegal activity that involves a computer, network or application