EC-Council CHFI (Computer Hacking Forensic Investigator) Exam Guide

The **CHFI** validates digital forensics skills. It prepares you to detect attacks, collect digital evidence legally, and analyze security incidents for courts or internal audits.

What is the 'Golden Rule' for digital forensics when seizing a hard drive?

Answer : Never work on the original evidence (always work on a certified clone).

Write-blockers are used to ensure the original data remains unaltered for legal integrity.

What is a 'Hash' value used for in digital forensics?

Answer : To provide a unique digital footprint that verifies evidence integrity.

A change in even a single bit of the file results in a completely different hash value.

Where is volatile information, such as running processes and network connections, stored?

Answer : In Random Access Memory (RAM).

Volatile data is lost if the computer is powered down or loses electricity.

What is 'Steganography'?

Answer : The practice of hiding a file or message inside another file (e.g., an image or video).

Unlike encryption, it aims to hide the presence of information entirely.

Why is 'Chain of Custody' essential in an investigation?

Answer : To prove the integrity and handling history of evidence for use in court.

Documents exactly who handled the evidence, when, where, and for what purpose.

Related Certifications

Local Testing

Careers

preload
preload
preload
preload
preload
preload