ECCouncil 112-57 - EC-Council Digital Forensics Essentials (DFE)
While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:
C:> net view <\10.10.10.11>
What was Jessy’s objective in running the above command?
In which of the following attacks does an attacker trick high-profile executives such as CEOs, CFOs, politicians, and celebrities to reveal critical corporate and personal information through email or website spoofing?
Sam, a digital forensic expert, is working on a case related to file tampering in a system at the administrative department of an organization. In this process, Sam started performing the following steps to analyze the acquired data to draw conclusions related to the case.
1.Analyze the file content for data usage.
2.Analyze the date and time of file creation and modification.
3.Find the users associated with file creation, access, and file modification.
4.Determine the physical storage location of the file.
5.Generate a timeline.
6.Identify the root cause of the incident.
Identify the type of analysis performed by Sam in the above scenario.
Sarah, a forensic investigator, is working on a criminal case. She was provided with all the suspect devices. Sarah employs an imaging software tool for duplicating the original data from the suspect devices. However, the tool she employed failed to image the data as the suspect version of the drive was very old and incompatible with imaging software. Hence, Sarah used an alternative data acquisition technique and succeeded in imaging the data.
Which of the following types of data acquisition techniques did Sarah employ in the above scenario?
Which of the following steps in forensic readiness planning provides a backup for future reference and assists in presenting evidence in a court of law?
Which of the following titles of The Electronic Communications Privacy Act protects the privacy of the contents of files stored by service providers and records held about the subscriber by service providers, such as subscriber name, billing records, and IP addresses?
Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.
Identify the role played by Jennifer in the forensics investigation.
Which of the following MAC forensic data components saves file information and related events using a token with a binary structure?
A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.
Which of the following port numbers does Tor use for establishing a connection via Tor nodes?
Which of the following Tor relay nodes in the Tor circuit is designed to transfer data in an encrypted format?
