Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 112-57 - EC-Council Digital Forensics Essentials (DFE)

Page: 1 / 3
Total 75 questions

While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:

C:> net view <\10.10.10.11>

What was Jessy’s objective in running the above command?

A.

Check file space usage to look for a sudden decrease in free space

B.

Review file shares to ensure their purpose

C.

Check whether sessions have been opened with other systems

D.

Verify the users using open sessions

In which of the following attacks does an attacker trick high-profile executives such as CEOs, CFOs, politicians, and celebrities to reveal critical corporate and personal information through email or website spoofing?

A.

Whaling

B.

Smishing

C.

Identity fraud

D.

Spimming

Sam, a digital forensic expert, is working on a case related to file tampering in a system at the administrative department of an organization. In this process, Sam started performing the following steps to analyze the acquired data to draw conclusions related to the case.

1.Analyze the file content for data usage.

2.Analyze the date and time of file creation and modification.

3.Find the users associated with file creation, access, and file modification.

4.Determine the physical storage location of the file.

5.Generate a timeline.

6.Identify the root cause of the incident.

Identify the type of analysis performed by Sam in the above scenario.

A.

Case analysis

B.

Data analysis

C.

Reporting

D.

Search and seizure

Sarah, a forensic investigator, is working on a criminal case. She was provided with all the suspect devices. Sarah employs an imaging software tool for duplicating the original data from the suspect devices. However, the tool she employed failed to image the data as the suspect version of the drive was very old and incompatible with imaging software. Hence, Sarah used an alternative data acquisition technique and succeeded in imaging the data.

Which of the following types of data acquisition techniques did Sarah employ in the above scenario?

A.

Sparse acquisition

B.

Bit-stream disk-to-image-file

C.

Logical acquisition

D.

Bit-stream disk-to-disk

Which of the following steps in forensic readiness planning provides a backup for future reference and assists in presenting evidence in a court of law?

A.

Creating a process for documenting the procedure

B.

Identifying the potential evidence required for an incident

C.

Determining the sources of evidence

D.

Keeping an incident response team ready to review the incident

Which of the following titles of The Electronic Communications Privacy Act protects the privacy of the contents of files stored by service providers and records held about the subscriber by service providers, such as subscriber name, billing records, and IP addresses?

A.

Title II

B.

Title IV

C.

Title III

D.

Title I

Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.

Identify the role played by Jennifer in the forensics investigation.

A.

Incident responder

B.

Incident analyzer

C.

Evidence manager

D.

Expert witness

Which of the following MAC forensic data components saves file information and related events using a token with a binary structure?

A.

Command-line inputs

B.

User account

C.

Basic Security Module

D.

Kexts

A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.

Which of the following port numbers does Tor use for establishing a connection via Tor nodes?

A.

1026/64666

B.

3024/4092

C.

31/456

D.

9150/9151

Which of the following Tor relay nodes in the Tor circuit is designed to transfer data in an encrypted format?

A.

Entry relay

B.

Guard relay

C.

Exit relay

D.

Middle relay