EC-Council • CHFI
Validates the ability to detect hacking attacks, extract and preserve digital evidence, and conduct forensic investigations, covering digital forensics methodology, evidence acquisition, chain-of-custody procedures, dark web forensics, IoT forensics, and malware forensics.
Questions
589
Duration
240 minutes
Passing Score
70%
Difficulty
AssociateLast Updated
Feb 2026
The Computer Hacking Forensic Investigator (CHFI) certification, offered by EC-Council under exam code 312-49, validates a practitioner's ability to detect hacking attacks, conduct thorough digital forensic investigations, and extract and preserve evidence in a manner admissible in legal proceedings. The program covers the full forensic investigation lifecycle — from searching and seizing digital assets through chain-of-custody procedures, data acquisition and duplication, defeating anti-forensic techniques, and final reporting. CHFI v11 is the current version of the program and introduced new modules on Dark Web Forensics and IoT Forensics, alongside enhanced coverage of malware forensics (including Emotet and EternalBlue), cloud forensics across AWS, Azure, and GCP, and RAM and Tor forensics.
Accredited under ISO/IEC 17024 (ANAB) and approved under U.S. DoD Directive 8140, CHFI carries formal government recognition as an intermediate-level qualification for three critical DFIR (Digital Forensics and Incident Response) work roles defined by the DoD Cyber Workforce Framework (DCWF). The certification is vendor-neutral in scope but technically deep, with more than 600 forensic tools covered across 68+ hands-on labs, making it one of the most lab-intensive digital forensics programs available.
CHFI is designed for cybersecurity and IT professionals who investigate, respond to, or prosecute cybercrime. Primary job roles include forensic computer analysts, cyber defense forensic analysts, malware analysts, incident responders, information security professionals, and IT auditors. It is also well-suited for law enforcement personnel, military and defense professionals, legal professionals who need to understand digital evidence, and banking or insurance professionals dealing with fraud investigations.
Candidates typically have a background in information technology or cybersecurity and are looking to specialize in digital forensics. The program is appropriate for both practitioners aiming to formalize existing skills and professionals transitioning into a DFIR-focused role. While there is no strict experience prerequisite if attending official training, those applying via the self-study eligibility path should have at least two years of information security experience.
There are no mandatory prerequisites for candidates who enroll in an official EC-Council authorized training program (via Training Partner, iLearn self-study, or iWeek live online). Attending the official CHFI course grants automatic eligibility to sit the exam upon completion.
Candidates who wish to challenge the exam without attending official training must submit an EC-Council Exam Eligibility Application, pay a non-refundable $100 eligibility fee, and demonstrate a minimum of two years of professional experience in the information security field. Practically, EC-Council recommends that candidates possess foundational knowledge of networking concepts, operating systems (Windows, Linux, macOS), cybersecurity fundamentals, and basic incident response procedures before undertaking CHFI study. Prior exposure to ethical hacking concepts (such as through CEH) is beneficial but not required.
The CHFI exam (312-49) consists of 150 multiple-choice questions and must be completed within 240 minutes (4 hours). The exam is delivered through EC-Council's ECC Exam Centers worldwide or via remote proctoring. The exam cost is $650 USD.
To maintain exam integrity, EC-Council administers the test in multiple forms with different question banks. Cut scores are set on a per-form basis, meaning the passing threshold can range from 60% to 85% depending on the specific form delivered. EC-Council publishes a 70% passing score as the benchmark figure. Scores are reported immediately upon completion at test centers. The certification is valid for three years, after which holders must earn 120 EC-Council Education Credits (ECE) to renew.
CHFI-certified professionals qualify for roles including Forensic Computer Analyst, Cyber Defense Forensic Analyst, Malware Analyst, Incident Responder, Cybercrime Investigator, and Information Systems Security Professional. The certification carries particular weight in government and defense sectors: under DoD Directive 8140 (the successor to DoD 8570), CHFI is formally recognized as an intermediate-level qualification for three DFIR-related DCWF work roles, making it a required or preferred credential for cybersecurity positions across U.S. federal agencies and defense contractors. The certification is also valued in finance, healthcare, legal, and insurance sectors where digital evidence and regulatory compliance intersect.
According to PayScale, CHFI-certified professionals earn an average salary of approximately $97,000, with ranges from $72,000 to $118,000 depending on role, location, and experience. Salary.com data places the average forensic analyst salary at $115,175 annually in the U.S. EC-Council reports that CHFI is the only forensics-focused certification program whose holders average a six-figure salary, according to its Salary Survey Report 75. Compared to alternatives such as GCFE (GIAC) or the AccessData ACE, CHFI's broader scope — spanning cloud, IoT, dark web, and mobile forensics — and its DoD recognition give it a stronger positioning for professionals targeting both private-sector and government DFIR roles.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 589 questions.
1. During incident response, an analyst reviews Sysmon logs and identifies Event ID 10 with GrantedAccess value 0x1010 targeting lsass.exe. What does this indicate? (Select one!)
Explanation
Sysmon Event ID 10 tracks ProcessAccess events including processes opening handles to other processes. When a process requests access to lsass.exe (Local Security Authority Subsystem Service) with GrantedAccess 0x1010, this represents PROCESS_QUERY_INFORMATION (0x0400) + PROCESS_VM_READ (0x0010) permissions. The PROCESS_VM_READ permission allows reading process memory, which is a key indicator of credential dumping tools like Mimikatz, ProcDump, or Cobalt Strike attempting to extract password hashes and Kerberos tickets from LSASS memory. Legitimate system processes rarely need to read LSASS memory. Crash dump creation would show different access rights and typically involve specific debugging tools. Windows Defender uses protected process mechanisms and would not generate suspicious access patterns to LSASS.
2. During live forensics of a Linux server suspected of compromise, an investigator wants to identify all currently established network connections including the processes that created them. Which command provides the most comprehensive information including process IDs and names? (Select one!)
Explanation
The lsof (list open files) command with -i (Internet connections), -n (no hostname resolution), and -P (no port name resolution) flags provides the most comprehensive network connection information including process IDs, process names, user ownership, file descriptors, connection state, and local/remote addresses. While netstat -tupn shows connections with processes, lsof provides richer detail including file descriptor information. The ss command is faster than netstat but provides similar output without the file descriptor details that lsof offers. The tcpdump command captures packet data but does not show process association with connections.
3. A forensic investigator analyzes a BitLocker-encrypted Windows system and needs to recover the encryption key. The organization uses Active Directory for key escrow. Which three locations should the investigator check for BitLocker recovery keys? (Select three!)
Multiple correct answersExplanation
Active Directory Domain Services, Microsoft Account cloud storage, and USB flash drive are the three primary BitLocker recovery key storage locations. AD DS automatically stores recovery keys for domain-joined systems when BitLocker is enabled via Group Policy. Microsoft Account cloud storage holds recovery keys when users link their account during BitLocker setup. USB flash drives are a common manual backup location users choose during encryption setup. The hibernation file contains a memory snapshot but the encryption key would be protected by BitLocker itself. Event ID 4776 relates to credential validation, not BitLocker key storage. The registry does not store plaintext recovery keys due to security design.
4. A malware analyst uses the Volatility Framework to examine a memory dump and runs the ldrmodules plugin. The output shows a DLL present in InLoadOrderModuleList and InMemoryOrderModuleList but missing from InInitializationOrderModuleList. What does this indicate? (Select one!)
Explanation
The Process Environment Block (PEB) maintains three doubly-linked lists of loaded modules: InLoadOrderModuleList, InMemoryOrderModuleList, and InInitializationOrderModuleList. Legitimate DLLs loaded during normal process startup appear in all three lists. When a DLL is injected into a running process using techniques like CreateRemoteThread or reflective DLL injection, it typically appears in the load order and memory order lists but is missing from the initialization order list because it was not loaded during the initialization phase. This discrepancy is a strong indicator of code injection, a common malware technique. Digital signatures do not affect PEB list presence. Memory corruption would typically cause more widespread inconsistencies rather than this specific pattern.
5. A forensic investigator examines an iOS device and extracts the KnowledgeC.db database from /private/var/mobile/Library/CoreDuet/Knowledge/. This database uses Apple Cocoa timestamp format. A relevant entry shows timestamp value 672451200. What is the equivalent Unix timestamp? (Select one!)
Explanation
Apple Cocoa timestamps count seconds since January 1, 2001. To convert to Unix timestamp counting from January 1, 1970, add 978,307,200 seconds. Calculation: 672,451,200 + 978,307,200 = 1,650,758,400 which corresponds to April 24, 2022. The other options result from incorrect conversion methods or arbitrary timestamps that do not match the conversion formula.
One-time access to this exam