Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ECCouncil 112-57 Dumps Questions Answers

Page: 1 / 6
Total 75 questions

EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Question 1

Michael, a forensic expert, was assigned to investigate an incident that involved unauthorized intrusion attempts. In this process, Michael identified all the open ports on a system and disabled them because these open ports can allow attackers to install malicious services and compromise the security of the system or network.

Which of the following commands assisted Michael in identifying open ports in the above scenario?

Options:

A.

netstat -i

B.

netstat -rn

C.

nmap -sT localhost

D.

ifconfig -promisc

Buy Now
Question 2

Below are the various steps involved in forensic readiness planning.

Keep an incident response team ready to review the incident and preserve the evidence.

Create a process for documenting the procedure.

Identify the potential evidence required for an incident.

Determine the sources of evidence.

Establish a legal advisory board to guide the investigation process.

Identify if the incident requires full or formal investigation.

Establish a policy for securely handling and storing the collected evidence.

Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption.

Identify the correct sequence of steps involved in forensic readiness planning.

Options:

A.

3-->4-->8-->7-->6-->2-->5-->1

B.

2-->3-->1-->4-->6-->5-->7-->8

C.

3-->1-->4-->5-->8-->2-->6-->7

D.

1-->2-->3-->4-->5-->6-->7-->8

Question 3

Below are the various steps involved in an email crime investigation.

1.Acquiring the email data

2.Analyzing email headers

3.Examining email messages

4.Recovering deleted email messages

5.Seizing the computer and email accounts

6.Retrieving email headers

What is the correct sequence of steps involved in the investigation of an email crime?

Options:

A.

5-->1-->3-->6-->2-->4

B.

2-->4-->3-->6-->5-->1

C.

1-->3-->6-->4-->5-->2

D.

1-->3-->4-->2-->5-->6

Question 4

Bob, a forensic investigator, is investigating a live Windows system found at a crime scene. In this process, Bob extracted subkeys containing information such as SAM, Security, and software using an automated tool called FTK Imager.

Which of the following Windows Registry hives’ subkeys provide the above information to Bob?

Options:

A.

HKEY_CLASSES_ROOT

B.

HKEY_LOCAL_MACHINE

C.

HKEY_CURRENT_USER

D.

HKEY_CURRENT_CONFIG

Question 5

Given below is a regex signature used by security professionals for detecting an XSS attack:

/((%3C)|<)[^\n]+((%3E)|>)/i

Which of the following types of XSS attack does the above regex expression detect?

Options:

A.

HTML tags-based XSS attempt

B.

CSS attack

C.

Simple XSS attack

D.

In-line comment XSS attack

Question 6

Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?

Options:

A.

MZHistoryView

B.

BrowsingHistoryView

C.

MZCacheView

D.

ChromeHistoryView

Question 7

Philip, a forensic officer, was tasked with investigating a crime scene. In this process, he created bit-by-bit copies of the suspect drive and retrieved all the disk images using the dd command.

Which of the following data acquisition image formats is extracted by Philip in the above scenario?

Options:

A.

Raw Format

B.

Advanced Forensic Framework 4 (AFF4)

C.

Advanced Forensics Format (AFF)

D.

Proprietary Format

Question 8

Alice and John are close college friends. Alice frequently sends emails to John attaching her pics with friends. One day, Alice sent an email to John describing all the details related to the final year project without specifying the actual purpose. John missed the message as he frequently receives emails from her and did not arrive for a project seminar.

Which of the following email fields could Alice have used in the above scenario to highlight the importance of the email?

Options:

A.

Subject

B.

Date

C.

Cc

D.

Bcc

Question 9

Which of the following standards and criteria version of SWGDE mandates that any action with the potential to alter, damage, or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner?

Options:

A.

Standards and Criteria 1.3

B.

Standards and Criteria 1.7

C.

Standards and Criteria 1.5

D.

Standards and Criteria 1.1

Question 10

Which of the following MAC forensic data components saves file information and related events using a token with a binary structure?

Options:

A.

Command-line inputs

B.

User account

C.

Basic Security Module

D.

Kexts

Question 11

An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose, Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locations and techniques.

Identify the type of device deployed by Steven in the above scenario.

Options:

A.

Intrusion detection system

B.

Firewall

C.

Honeypot

D.

Router

Question 12

Which of the following data acquisition formats supports the Lempel-Ziv–Markov chain (LZMA) algorithm for compression?

Options:

A.

Raw Format

B.

Advanced Forensics Format

C.

Advanced ForensicFramework 4

D.

Proprietary Format

Question 13

Cooper, a forensic analyst, was examining a RAM dump extracted from a Linux system. In this process, he employed an automated tool, Volatility Framework, to identify any malicious code hidden inside the memory.

Which of the following plugins of the Volatility Framework helps Cooper detect hidden or injected files in the memory?

Options:

A.

linux_malfind

B.

linux_netstat

C.

ip addr show

D.

nmap -sU localhost

Question 14

Sam is working as a loan agent for a financial institution. He frequently receives a number of emails from clients providing their personal details for loan approval. As these emails contain sensitive data, Sam had set up a feature that directly downloads the emails on his device without storing a copy on the mail server. Which of the following protocols provides the above-discussed email features?

Options:

A.

SHA-1

B.

ICMP

C.

POP3

D.

SNMP

Question 15

A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.

Which of the following port numbers does Tor use for establishing a connection via Tor nodes?

Options:

A.

1026/64666

B.

3024/4092

C.

31/456

D.

9150/9151

Question 16

In which of the following attacks does an attacker trick high-profile executives such as CEOs, CFOs, politicians, and celebrities to reveal critical corporate and personal information through email or website spoofing?

Options:

A.

Whaling

B.

Smishing

C.

Identity fraud

D.

Spimming

Question 17

Wesley, a professional hacker, deleted a confidential file in a compromised system using the “/bin/rm/” command to deny access to forensic specialists.

Identify the operating system on which Don has performed the file carving act.

Options:

A.

Windows

B.

Android

C.

Mac OS

D.

Linux

Question 18

Below is an extracted Apache error log entry.

“[Wed Aug 28 13:35:38.878945 2020] [core:error] [pid 12356:tid 8689896234] [client 10.0.0.8] File not found: /images/folder/pic.jpg”

Identify the element in the Apache error log entry above that represents the IP address from which the request was made.

Options:

A.

13:35:38.878945

B.

12356

C.

10.0.0.8

D.

8689896234

Question 19

While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:

C:> net view <\10.10.10.11>

What was Jessy’s objective in running the above command?

Options:

A.

Check file space usage to look for a sudden decrease in free space

B.

Review file shares to ensure their purpose

C.

Check whether sessions have been opened with other systems

D.

Verify the users using open sessions

Question 20

Kelvin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kelvin decided to use an automated tool to recover the damaged, corrupted, or deleted files.

Which of the following forensic tools can help Kelvin in recovering deleted files?

Options:

A.

Ophcrack

B.

Cain & Abel

C.

R-Studio

D.

Rohos Mini Drive

Question 21

Benoy, a security professional at an organization, extracted Apache access log entries to view critical information about all the operations performed on a web server. The Apache access log extracted by Benoy is given below:

“10.10.10.10 - Jason [17/Aug/2019:00:12:34 +0300] "GET /images/content/bg_body_1.jpg HTTP/1.0" 500 1458”

Identify the HTTP status code in the Apache access log entry above that indicates the response was successful.

Options:

A.

+0300

B.

500

C.

1.0

D.

2019

Question 22

Identify the investigation team member who is responsible for evidence gathered at the crime scene and maintains a record of the evidence, making it admissible in a court of law.

Options:

A.

Incident analyzer

B.

Evidence examiner

C.

Incident responder

D.

Evidence manager

Page: 1 / 6
Total 75 questions