Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ECCouncil 112-57 EC-Council Digital Forensics Essentials (DFE) Exam Practice Test

Demo: 22 questions
Total 75 questions

EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Question 1

James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.

Identify the tool employed by James in the above scenario.

Options:

A.

ESEDatabaseView

B.

ProcDump

C.

DriveLetterView

D.

PromiscDetect

Question 2

An investigator wants to extract information about the status of the network interface cards (NICs) in an organization’s Windows-based systems. Identify the command-line utility that can help the investigator detect the network status.

Options:

A.

ipconfig

B.

PsLoggedOn

C.

PsList

D.

ifconfig

Question 3

Clark, a security professional, identified that one of the systems in the organization is infected with malware and was used for creating a backdoor. Clark employed an automated tool to analyze the system's memory and detect malicious activities performed on the system.

In the above scenario, which of the following tools did Clark employ to detect malicious activities performed on the system?

Options:

A.

Medusa

B.

Redline

C.

Shodan

D.

Wireshark

Question 4

Which of the following tools can be used by an investigator to analyze the metadata of files in a Windows-based system?

Options:

A.

Bulk Extractor

B.

Tor browser

C.

IECachesView

D.

Paraben P2 Commander

Question 5

A government organization decided to establish a computer forensics lab to perform transparent investigation processes on highly sensitive cases. The organization also decided to establish strong physical security around the premises of the forensics lab.

Which of the following security measures helps the organization in providing strong physical security to the forensics lab?

Options:

A.

Never place fire extinguishers in and outside the lab

B.

Do not maintain a log register at the entrance of the lab

C.

Shield workstations from transmitting electromagnetic signals

D.

Never keep the lab under surveillance

Question 6

Bob, a forensic specialist at a newly established NGO, discovered a security loophole in the NGO’s web application, which unintentionally reveals early enrolled NGO members’ biodata to attackers. Bob immediately employed a content filtering mechanism to protect all the NGO’s data sources and prevent further damage.

Identify the web application threat identified by Bob in the above scenario.

Options:

A.

Buffer overflow

B.

Information leakage

C.

Authentication hijacking

D.

Cookie poisoning

Question 7

Kelvin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kelvin decided to use an automated tool to recover the damaged, corrupted, or deleted files.

Which of the following forensic tools can help Kelvin in recovering deleted files?

Options:

A.

Ophcrack

B.

Cain & Abel

C.

R-Studio

D.

Rohos Mini Drive

Question 8

Which of the following data acquisition formats supports the Lempel-Ziv–Markov chain (LZMA) algorithm for compression?

Options:

A.

Raw Format

B.

Advanced Forensics Format

C.

Advanced ForensicFramework 4

D.

Proprietary Format

Question 9

Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.

Identify the role played by Jennifer in the forensics investigation.

Options:

A.

Incident responder

B.

Incident analyzer

C.

Evidence manager

D.

Expert witness

Question 10

Bob, a security specialist at an organization, extracted the following IIS log from a Windows-based server:

“2019-12-12 06:11:41 192.168.0.10 GET /images/content/bg_body1.jpg - 80 - 192.168.0.27 Mozilla/5.0+(Windows+NT+6.3;+WOW64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/48.0.2564.103+Safari/537.36 http://www.moviescope.com/css/style.css 200 0 0 365”

Identify the element in the above IIS log entry that indicates the request was fulfilled without error.

Options:

A.

537

B.

80

C.

200

D.

192

Question 11

Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization’s network.

Identify the type of network attack Bob initiated on the target organization in the above scenario.

Options:

A.

Data modification

B.

Enumeration

C.

Session hijacking

D.

Buffer overflow

Question 12

Below is the syntax of a command-line utility that displays active TCP connections and ports on which the computer is listening.

netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]

Identify the netstat parameter that displays active TCP connections and includes the process ID (PID) for each connection.

Options:

A.

[-n]

B.

[-a]

C.

[-o]

D.

[-s]

Question 13

Which of the following titles of The Electronic Communications Privacy Act protects the privacy of the contents of files stored by service providers and records held about the subscriber by service providers, such as subscriber name, billing records, and IP addresses?

Options:

A.

Title II

B.

Title IV

C.

Title III

D.

Title I

Question 14

Which of the following Tor relay nodes in the Tor circuit is designed to transfer data in an encrypted format?

Options:

A.

Entry relay

B.

Guard relay

C.

Exit relay

D.

Middle relay

Question 15

Which of the following steps in forensic readiness planning provides a backup for future reference and assists in presenting evidence in a court of law?

Options:

A.

Creating a process for documenting the procedure

B.

Identifying the potential evidence required for an incident

C.

Determining the sources of evidence

D.

Keeping an incident response team ready to review the incident

Question 16

Philip, a forensic officer, was tasked with investigating a crime scene. In this process, he created bit-by-bit copies of the suspect drive and retrieved all the disk images using the dd command.

Which of the following data acquisition image formats is extracted by Philip in the above scenario?

Options:

A.

Raw Format

B.

Advanced Forensic Framework 4 (AFF4)

C.

Advanced Forensics Format (AFF)

D.

Proprietary Format

Question 17

Wesley, a professional hacker, deleted a confidential file in a compromised system using the “/bin/rm/” command to deny access to forensic specialists.

Identify the operating system on which Don has performed the file carving act.

Options:

A.

Windows

B.

Android

C.

Mac OS

D.

Linux

Question 18

Which of the following folders of macOS stores all the files, documents, applications, library folders, etc. pertaining to a particular user?

Options:

A.

Spotlight

B.

Time Machine

C.

Finder

D.

Home Directory

Question 19

Which of the following standards and criteria version of SWGDE mandates that any action with the potential to alter, damage, or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner?

Options:

A.

Standards and Criteria 1.3

B.

Standards and Criteria 1.7

C.

Standards and Criteria 1.5

D.

Standards and Criteria 1.1

Question 20

Which of the following MAC forensic data components saves file information and related events using a token with a binary structure?

Options:

A.

Command-line inputs

B.

User account

C.

Basic Security Module

D.

Kexts

Question 21

Which of the following files belonging to the Extensible Storage Engine (ESE) stores the mail data in Microsoft Exchange Server?

Options:

A.

DataStore.edb

B.

Mail.MSMessageStore

C.

WLCalendarStore.edb

D.

Database.edb

Question 22

Which of the following commands can an investigator use to parse GPTs of both types of hard disks, including those formatted with either UEFI or MBR?

Options:

A.

Get-BootSector

B.

Get-PartitionTable

C.

Get-ForensicPartitionTable

D.

Get-GPT

Demo: 22 questions
Total 75 questions