Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

DEF Changed 112-57 Questions

Page: 2 / 6
Total 75 questions

EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Question 5

Given below is a regex signature used by security professionals for detecting an XSS attack:

/((%3C)|<)[^\n]+((%3E)|>)/i

Which of the following types of XSS attack does the above regex expression detect?

Options:

A.

HTML tags-based XSS attempt

B.

CSS attack

C.

Simple XSS attack

D.

In-line comment XSS attack

Question 6

Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?

Options:

A.

MZHistoryView

B.

BrowsingHistoryView

C.

MZCacheView

D.

ChromeHistoryView

Question 7

Philip, a forensic officer, was tasked with investigating a crime scene. In this process, he created bit-by-bit copies of the suspect drive and retrieved all the disk images using the dd command.

Which of the following data acquisition image formats is extracted by Philip in the above scenario?

Options:

A.

Raw Format

B.

Advanced Forensic Framework 4 (AFF4)

C.

Advanced Forensics Format (AFF)

D.

Proprietary Format

Question 8

Alice and John are close college friends. Alice frequently sends emails to John attaching her pics with friends. One day, Alice sent an email to John describing all the details related to the final year project without specifying the actual purpose. John missed the message as he frequently receives emails from her and did not arrive for a project seminar.

Which of the following email fields could Alice have used in the above scenario to highlight the importance of the email?

Options:

A.

Subject

B.

Date

C.

Cc

D.

Bcc

Page: 2 / 6
Total 75 questions