Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-49v11 Exam - Topic 12 Question 9 Discussion

Actual exam question for Eccouncil's 312-49v11 exam
Question #: 9
Topic #: 12
[All 312-49v11 Questions]

A cybersecurity firm is conducting a forensic investigation into a suspected data breach at a financial institution. During the investigation, the forensic analysts encounter encrypted files protected by strong passwords, hindering their ability to access critical evidence related to the breach.

Considering the challenges posed by password protection in digital forensics investigations, which anti-forensics technique is being employed to impede the forensic analysis process in this scenario?

Show Suggested Answer Hide Answer
Suggested Answer: C

This scenario aligns with CHFI v11 objectives under Anti-Forensics Techniques, specifically techniques used by attackers to prevent investigators from accessing digital evidence. Data encryption is a well-known and widely used anti-forensic method where files are encrypted using strong cryptographic algorithms and protected with complex passwords. While encryption is a legitimate security control, adversaries often misuse it to deliberately obstruct forensic analysis and delay investigations.

CHFI v11 explains that encrypted files render data unreadable without the correct decryption key, making it extremely difficult for investigators to examine file contents within acceptable timeframes. This can significantly hinder evidence discovery, timeline reconstruction, and incident scoping. Investigators must then rely on password cracking, key recovery, memory forensics, or legal assistance to access the data---each of which introduces complexity, cost, and time delays.

Data manipulation involves altering or deleting evidence, data obfuscation focuses on making data confusing but still accessible, and data hiding conceals information in alternate locations. In contrast, the defining characteristic in this scenario is password-protected encrypted files, which directly corresponds to data encryption. Therefore, consistent with CHFI v11 classifications, data encryption is the correct anti-forensic technique being employed.


Contribute your Thoughts:

0/2000 characters
Lenna
4 days ago
I think the answer might be C) Data encryption since the files are encrypted with strong passwords, but I'm not entirely sure.
upvoted 0 times
...

Save Cancel