Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECCouncil 112-57 Questions Answers

Page: 4 / 6
Total 75 questions

EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Question 13

Cooper, a forensic analyst, was examining a RAM dump extracted from a Linux system. In this process, he employed an automated tool, Volatility Framework, to identify any malicious code hidden inside the memory.

Which of the following plugins of the Volatility Framework helps Cooper detect hidden or injected files in the memory?

Options:

A.

linux_malfind

B.

linux_netstat

C.

ip addr show

D.

nmap -sU localhost

Question 14

Sam is working as a loan agent for a financial institution. He frequently receives a number of emails from clients providing their personal details for loan approval. As these emails contain sensitive data, Sam had set up a feature that directly downloads the emails on his device without storing a copy on the mail server. Which of the following protocols provides the above-discussed email features?

Options:

A.

SHA-1

B.

ICMP

C.

POP3

D.

SNMP

Question 15

A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.

Which of the following port numbers does Tor use for establishing a connection via Tor nodes?

Options:

A.

1026/64666

B.

3024/4092

C.

31/456

D.

9150/9151

Question 16

In which of the following attacks does an attacker trick high-profile executives such as CEOs, CFOs, politicians, and celebrities to reveal critical corporate and personal information through email or website spoofing?

Options:

A.

Whaling

B.

Smishing

C.

Identity fraud

D.

Spimming

Page: 4 / 6
Total 75 questions