Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ECCouncil 112-57 EC-Council Digital Forensics Essentials (DFE) Exam Practice Test

Page: 1 / 8
Total 75 questions

EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Question 1

Which of the following measures is defined as the time to move read or write disc heads from one point to another on the disk?

Options:

A.

Delay time

B.

Access time

C.

Seek time

D.

Mean time

Question 2

Below are the elements included in the order of volatility for a typical computing system as per the RFC 3227 guidelines for evidence collection and archiving.

Archival media

Remote logging and monitoring data related to the target system

Routing table, process table, kernel statistics, and memory

Registers and processor cache

Physical configuration and network topology

Disk or other storage media

Temporary system files

Identify the correct sequence of order of volatility from the most to least volatile for a typical system.

Options:

A.

7-->5-->4-->3-->2-->6-->1

B.

4-->3-->7-->6-->2-->5-->1

C.

2-->1-->4-->3-->6-->5-->7

D.

4-->3-->7-->1-->2-->5-->6

Question 3

Bob, a forensic investigator, was instructed to review a Windows machine and identify any anonymous activities performed using it. In this process, Bob used the command “netstat -ano” to view all the active connections in the system and determined that the connections established by the Tor browser were closed.

Which of the following states of the connections established by Tor indicates that the Tor browser is closed?

Options:

A.

CLOSE_WAIT

B.

TIME_WAIT

C.

ESTABLISHED

D.

LISTENING

Question 4

Which of the following titles of The Electronic Communications Privacy Act protects the privacy of the contents of files stored by service providers and records held about the subscriber by service providers, such as subscriber name, billing records, and IP addresses?

Options:

A.

Title II

B.

Title IV

C.

Title III

D.

Title I

Question 5

Alice and John are close college friends. Alice frequently sends emails to John attaching her pics with friends. One day, Alice sent an email to John describing all the details related to the final year project without specifying the actual purpose. John missed the message as he frequently receives emails from her and did not arrive for a project seminar.

Which of the following email fields could Alice have used in the above scenario to highlight the importance of the email?

Options:

A.

Subject

B.

Date

C.

Cc

D.

Bcc

Question 6

Cheryl, a forensic expert, was recruited to investigate a malicious activity performed by an anonymous hackers’ group on an organization’s systems. Using an automated tool, Cheryl was able to extract the malware file and analyze the assembly code instructions, which helped him understand the malware’s purpose.

Which of the following tools helped Cheryl extract and analyze the assembly code of the malware?

Options:

A.

Virtual Box

B.

QualNet

C.

OllyDbg

D.

VMware vSphere

Question 7

Identify the malware analysis technique in which the investigators must take a snapshot of the baseline state of the forensic workstation before malware execution.

Options:

A.

Online malware scanning

B.

Monitoring host integrity

C.

String search

D.

File fingerprinting

Question 8

Which of the following commands can an investigator use to parse GPTs of both types of hard disks, including those formatted with either UEFI or MBR?

Options:

A.

Get-BootSector

B.

Get-PartitionTable

C.

Get-ForensicPartitionTable

D.

Get-GPT

Question 9

Bob, a forensic specialist at a newly established NGO, discovered a security loophole in the NGO’s web application, which unintentionally reveals early enrolled NGO members’ biodata to attackers. Bob immediately employed a content filtering mechanism to protect all the NGO’s data sources and prevent further damage.

Identify the web application threat identified by Bob in the above scenario.

Options:

A.

Buffer overflow

B.

Information leakage

C.

Authentication hijacking

D.

Cookie poisoning

Question 10

Which of the following steps in forensic readiness planning provides a backup for future reference and assists in presenting evidence in a court of law?

Options:

A.

Creating a process for documenting the procedure

B.

Identifying the potential evidence required for an incident

C.

Determining the sources of evidence

D.

Keeping an incident response team ready to review the incident

Question 11

Jack, a forensic investigator, was appointed to investigate a Windows-based security incident. In this process, he employed an Autopsy tool to recover the deleted files from unallocated space, which helps in gathering potential evidence.

Which of the following functions of Autopsy helped Jack recover the deleted files?

Options:

A.

Timeline analysis

B.

Multimedia

C.

Web artifacts

D.

Data carving

Question 12

Harry, a security professional, was hired to identify the details of an attack that was initiated on a Windows system. In this process, Harry decided to check the logs of currently running applications and the information related to previously uninstalled or removed applications for suspicious events.

Which of the following folders in a Windows system stores information on applications run on the system?

Options:

A.

C:\Windows\Book

B.

C:\subdir

C.

C:\Windows\Prefetch

D.

C:\Windows\debug

Question 13

Which of the following standards and criteria version of SWGDE mandates that any action with the potential to alter, damage, or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner?

Options:

A.

Standards and Criteria 1.3

B.

Standards and Criteria 1.7

C.

Standards and Criteria 1.5

D.

Standards and Criteria 1.1

Question 14

Given below are different steps involved in event correlation.

Event masking

Event aggregation

Root cause analysis

Event filtering

Identify the correct sequence of steps involved in event correlation.

Options:

A.

1-->3-->2-->4

B.

2-->1-->4-->3

C.

1-->3-->4-->2

D.

2-->4-->3-->1

Question 15

Which of the following files belonging to the Extensible Storage Engine (ESE) stores the mail data in Microsoft Exchange Server?

Options:

A.

DataStore.edb

B.

Mail.MSMessageStore

C.

WLCalendarStore.edb

D.

Database.edb

Question 16

Michael, a forensic expert, was assigned to investigate an incident that involved unauthorized intrusion attempts. In this process, Michael identified all the open ports on a system and disabled them because these open ports can allow attackers to install malicious services and compromise the security of the system or network.

Which of the following commands assisted Michael in identifying open ports in the above scenario?

Options:

A.

netstat -i

B.

netstat -rn

C.

nmap -sT localhost

D.

ifconfig -promisc

Question 17

Kelvin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kelvin decided to use an automated tool to recover the damaged, corrupted, or deleted files.

Which of the following forensic tools can help Kelvin in recovering deleted files?

Options:

A.

Ophcrack

B.

Cain & Abel

C.

R-Studio

D.

Rohos Mini Drive

Question 18

Below is an extracted Apache error log entry.

“[Wed Aug 28 13:35:38.878945 2020] [core:error] [pid 12356:tid 8689896234] [client 10.0.0.8] File not found: /images/folder/pic.jpg”

Identify the element in the Apache error log entry above that represents the IP address from which the request was made.

Options:

A.

13:35:38.878945

B.

12356

C.

10.0.0.8

D.

8689896234

Question 19

John, a forensic officer, was working on a criminal case. He employed imaging software to create a copy of data from the suspect device on a storage medium for further investigation. For developing an image of the original data, John used a software application that does not allow an unauthorized user to alter the image content on storage media, thereby retaining an unaltered image copy.

Identify the data acquisition step performed by John in the above scenario.

Options:

A.

Enabled write protection on the evidence media

B.

Validated data acquisition

C.

Sanitized the target media

D.

Planned for contingency

Question 20

A disk drive has 16,384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data.

What is the total size of the disk?

Options:

A.

42,278,584,320 bytes

B.

42,278,584,340 bytes

C.

42,279,584,320 bytes

D.

43,278,584,320 bytes

Question 21

Which of the following layers of the TCP/IP model serves as the backbone for data flow between two devices in a network and enables peer entities on the source and destination devices to communicate with each other?

Options:

A.

Internet layer

B.

Network access layer

C.

Transport layer

D.

Application layer

Question 22

While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:

C:> net view <\10.10.10.11>

What was Jessy’s objective in running the above command?

Options:

A.

Check file space usage to look for a sudden decrease in free space

B.

Review file shares to ensure their purpose

C.

Check whether sessions have been opened with other systems

D.

Verify the users using open sessions

Page: 1 / 8
Total 75 questions