Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

ECCouncil 112-57 Dumps

Page: 1 / 8
Total 75 questions

EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Question 1

Which of the following NTFS system files contains a record of every file present in the system?

Options:

A.

$quota

B.

$mft

C.

$volume

D.

$logfile

Question 2

Bob, a forensic specialist at a newly established NGO, discovered a security loophole in the NGO’s web application, which unintentionally reveals early enrolled NGO members’ biodata to attackers. Bob immediately employed a content filtering mechanism to protect all the NGO’s data sources and prevent further damage.

Identify the web application threat identified by Bob in the above scenario.

Options:

A.

Buffer overflow

B.

Information leakage

C.

Authentication hijacking

D.

Cookie poisoning

Question 3

While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:

C:> net view <\10.10.10.11>

What was Jessy’s objective in running the above command?

Options:

A.

Check file space usage to look for a sudden decrease in free space

B.

Review file shares to ensure their purpose

C.

Check whether sessions have been opened with other systems

D.

Verify the users using open sessions

Question 4

Which of the following network protocols creates secure tunneling through which content obfuscation can be achieved?

Options:

A.

SNMP

B.

ARP

C.

SSH

D.

UDP

Question 5

Kane, an investigation specialist, was appointed to investigate an incident in an organization's network. In this process, Kane executed a command and identified that a network interface is running in the promiscuous mode and is allowing all incoming packets without any restriction.

In the above scenario, which of the following commands did Kane use to check whether the network interface is set to the promiscuous mode?

Options:

A.

nmap -sT localhost

B.

ipconfig

C.

ifconfig

D.

netstat -i

Question 6

Below are the various steps involved in forensic readiness planning.

Keep an incident response team ready to review the incident and preserve the evidence.

Create a process for documenting the procedure.

Identify the potential evidence required for an incident.

Determine the sources of evidence.

Establish a legal advisory board to guide the investigation process.

Identify if the incident requires full or formal investigation.

Establish a policy for securely handling and storing the collected evidence.

Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption.

Identify the correct sequence of steps involved in forensic readiness planning.

Options:

A.

3-->4-->8-->7-->6-->2-->5-->1

B.

2-->3-->1-->4-->6-->5-->7-->8

C.

3-->1-->4-->5-->8-->2-->6-->7

D.

1-->2-->3-->4-->5-->6-->7-->8

Question 7

Given below are different steps involved in event correlation.

Event masking

Event aggregation

Root cause analysis

Event filtering

Identify the correct sequence of steps involved in event correlation.

Options:

A.

1-->3-->2-->4

B.

2-->1-->4-->3

C.

1-->3-->4-->2

D.

2-->4-->3-->1

Question 8

Which of the following acts was passed by the U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations?

Options:

A.

The Electronic Communications Privacy Act

B.

General Data Protection Regulation (GDPR)

C.

Sarbanes–Oxley Act (SOX)

D.

Information Privacy Act 2014

Question 9

Andrew, a system administrator, is performing a UEFI boot process. The current phase of the UEFI boot process consists of the initialization code that the system executes after powering on the EFI system. This phase also manages platform reset events and sets up the system so that it can find, validate, install, and run the PEI.

Which of the following UEFI boot phases is the process currently in?

Options:

A.

Driver execution environment phase

B.

Boot device selection phase

C.

Pre-EFI initialization phase

D.

Security phase

Question 10

Clark, a digital forensic expert, was assigned to investigate a malicious activity performed on an organization’s network. The organization provided Clark with all the information related to the incident. In this process, he assessed the impact of the incident on the organization, reasons for and source of the incident, steps required to tackle the incident, investigation team required to handle the case, investigative procedures, and possible outcome of the forensic process.

Identify the type of analysis performed by Clark in the above scenario.

Options:

A.

Traffic analysis

B.

Case analysis

C.

Data analysis

D.

Log analysis

Question 11

Which of the following Tor relay nodes in the Tor circuit is designed to transfer data in an encrypted format?

Options:

A.

Entry relay

B.

Guard relay

C.

Exit relay

D.

Middle relay

Question 12

Clark, a security professional, identified that one of the systems in the organization is infected with malware and was used for creating a backdoor. Clark employed an automated tool to analyze the system's memory and detect malicious activities performed on the system.

In the above scenario, which of the following tools did Clark employ to detect malicious activities performed on the system?

Options:

A.

Medusa

B.

Redline

C.

Shodan

D.

Wireshark

Question 13

A disk drive has 16,384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data.

What is the total size of the disk?

Options:

A.

42,278,584,320 bytes

B.

42,278,584,340 bytes

C.

42,279,584,320 bytes

D.

43,278,584,320 bytes

Question 14

Below is an extracted Apache error log entry.

“[Wed Aug 28 13:35:38.878945 2020] [core:error] [pid 12356:tid 8689896234] [client 10.0.0.8] File not found: /images/folder/pic.jpg”

Identify the element in the Apache error log entry above that represents the IP address from which the request was made.

Options:

A.

13:35:38.878945

B.

12356

C.

10.0.0.8

D.

8689896234

Question 15

Which of the following types of phishing attacks allows an attacker to exploit instant messaging platforms by employing IM as a tool to spread spam?

Options:

A.

Whaling

B.

Pharming

C.

Spimming

D.

Spear phishing

Question 16

Sarah, a forensic investigator, is working on a criminal case. She was provided with all the suspect devices. Sarah employs an imaging software tool for duplicating the original data from the suspect devices. However, the tool she employed failed to image the data as the suspect version of the drive was very old and incompatible with imaging software. Hence, Sarah used an alternative data acquisition technique and succeeded in imaging the data.

Which of the following types of data acquisition techniques did Sarah employ in the above scenario?

Options:

A.

Sparse acquisition

B.

Bit-stream disk-to-image-file

C.

Logical acquisition

D.

Bit-stream disk-to-disk

Question 17

Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization’s network.

Identify the type of network attack Bob initiated on the target organization in the above scenario.

Options:

A.

Data modification

B.

Enumeration

C.

Session hijacking

D.

Buffer overflow

Question 18

Bob, a network specialist in an organization, is attempting to identify malicious activities in the network. In this process, Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation.

Which of the following types of network-based evidence was collected by Bob in the above scenario?

Options:

A.

Full content data

B.

Statistical data

C.

Session data

D.

Alert data

Question 19

Williams, a forensic specialist, was tasked with performing a static malware analysis on a suspect system in an organization. For this purpose, Williams used an automated tool to perform a string search and saved all the identified strings in a text file. After analyzing the strings, he determined all the harmful actions that were performed by malware.

Identify the tool employed by Williams in the above scenario.

Options:

A.

R-Drive Image

B.

ResourcesExtract

C.

Ezvid

D.

Snagit

Question 20

Which of the following steps in forensic readiness planning provides a backup for future reference and assists in presenting evidence in a court of law?

Options:

A.

Creating a process for documenting the procedure

B.

Identifying the potential evidence required for an incident

C.

Determining the sources of evidence

D.

Keeping an incident response team ready to review the incident

Question 21

Which of the following folders of macOS stores all the files, documents, applications, library folders, etc. pertaining to a particular user?

Options:

A.

Spotlight

B.

Time Machine

C.

Finder

D.

Home Directory

Question 22

Which of the following tools helps a forensics investigator develop and test across multiple operating systems in a virtual machine for Mac and allows access to Microsoft Office for Windows?

Options:

A.

Riverbed Modeler

B.

Parallels Desktop 16

C.

Camtasia

D.

NetSim

Page: 1 / 8
Total 75 questions