Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

DEF 112-57 Full Course Free

Page: 5 / 6
Total 75 questions

EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Question 17

Wesley, a professional hacker, deleted a confidential file in a compromised system using the “/bin/rm/” command to deny access to forensic specialists.

Identify the operating system on which Don has performed the file carving act.

Options:

A.

Windows

B.

Android

C.

Mac OS

D.

Linux

Question 18

Below is an extracted Apache error log entry.

“[Wed Aug 28 13:35:38.878945 2020] [core:error] [pid 12356:tid 8689896234] [client 10.0.0.8] File not found: /images/folder/pic.jpg”

Identify the element in the Apache error log entry above that represents the IP address from which the request was made.

Options:

A.

13:35:38.878945

B.

12356

C.

10.0.0.8

D.

8689896234

Question 19

While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:

C:> net view <\10.10.10.11>

What was Jessy’s objective in running the above command?

Options:

A.

Check file space usage to look for a sudden decrease in free space

B.

Review file shares to ensure their purpose

C.

Check whether sessions have been opened with other systems

D.

Verify the users using open sessions

Question 20

Kelvin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kelvin decided to use an automated tool to recover the damaged, corrupted, or deleted files.

Which of the following forensic tools can help Kelvin in recovering deleted files?

Options:

A.

Ophcrack

B.

Cain & Abel

C.

R-Studio

D.

Rohos Mini Drive

Page: 5 / 6
Total 75 questions