Pre-Summer Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

112-57 EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Questions 4

Alice and John are close college friends. Alice frequently sends emails to John attaching her pics with friends. One day, Alice sent an email to John describing all the details related to the final year project without specifying the actual purpose. John missed the message as he frequently receives emails from her and did not arrive for a project seminar.

Which of the following email fields could Alice have used in the above scenario to highlight the importance of the email?

Options:

A.

Subject

B.

Date

C.

Cc

D.

Bcc

Buy Now
Questions 5

While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:

C:> net view <\10.10.10.11>

What was Jessy’s objective in running the above command?

Options:

A.

Check file space usage to look for a sudden decrease in free space

B.

Review file shares to ensure their purpose

C.

Check whether sessions have been opened with other systems

D.

Verify the users using open sessions

Buy Now
Questions 6

Sam, a digital forensic expert, is working on a case related to file tampering in a system at the administrative department of an organization. In this process, Sam started performing the following steps to analyze the acquired data to draw conclusions related to the case.

1.Analyze the file content for data usage.

2.Analyze the date and time of file creation and modification.

3.Find the users associated with file creation, access, and file modification.

4.Determine the physical storage location of the file.

5.Generate a timeline.

6.Identify the root cause of the incident.

Identify the type of analysis performed by Sam in the above scenario.

Options:

A.

Case analysis

B.

Data analysis

C.

Reporting

D.

Search and seizure

Buy Now
Questions 7

Below are the various steps involved in forensic readiness planning.

Keep an incident response team ready to review the incident and preserve the evidence.

Create a process for documenting the procedure.

Identify the potential evidence required for an incident.

Determine the sources of evidence.

Establish a legal advisory board to guide the investigation process.

Identify if the incident requires full or formal investigation.

Establish a policy for securely handling and storing the collected evidence.

Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption.

Identify the correct sequence of steps involved in forensic readiness planning.

Options:

A.

3-->4-->8-->7-->6-->2-->5-->1

B.

2-->3-->1-->4-->6-->5-->7-->8

C.

3-->1-->4-->5-->8-->2-->6-->7

D.

1-->2-->3-->4-->5-->6-->7-->8

Buy Now
Questions 8

Kane, an investigation specialist, was appointed to investigate an incident in an organization's network. In this process, Kane executed a command and identified that a network interface is running in the promiscuous mode and is allowing all incoming packets without any restriction.

In the above scenario, which of the following commands did Kane use to check whether the network interface is set to the promiscuous mode?

Options:

A.

nmap -sT localhost

B.

ipconfig

C.

ifconfig

D.

netstat -i

Buy Now
Questions 9

Andrew, a system administrator, is performing a UEFI boot process. The current phase of the UEFI boot process consists of the initialization code that the system executes after powering on the EFI system. This phase also manages platform reset events and sets up the system so that it can find, validate, install, and run the PEI.

Which of the following UEFI boot phases is the process currently in?

Options:

A.

Driver execution environment phase

B.

Boot device selection phase

C.

Pre-EFI initialization phase

D.

Security phase

Buy Now
Questions 10

Which of the following Tor relay nodes in the Tor circuit is designed to transfer data in an encrypted format?

Options:

A.

Entry relay

B.

Guard relay

C.

Exit relay

D.

Middle relay

Buy Now
Questions 11

Which of the following acts was passed by the U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations?

Options:

A.

The Electronic Communications Privacy Act

B.

General Data Protection Regulation (GDPR)

C.

Sarbanes–Oxley Act (SOX)

D.

Information Privacy Act 2014

Buy Now
Questions 12

Kelvin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kelvin decided to use an automated tool to recover the damaged, corrupted, or deleted files.

Which of the following forensic tools can help Kelvin in recovering deleted files?

Options:

A.

Ophcrack

B.

Cain & Abel

C.

R-Studio

D.

Rohos Mini Drive

Buy Now
Questions 13

Harry, a security professional, was hired to identify the details of an attack that was initiated on a Windows system. In this process, Harry decided to check the logs of currently running applications and the information related to previously uninstalled or removed applications for suspicious events.

Which of the following folders in a Windows system stores information on applications run on the system?

Options:

A.

C:\Windows\Book

B.

C:\subdir

C.

C:\Windows\Prefetch

D.

C:\Windows\debug

Buy Now
Questions 14

Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization’s network.

Identify the type of network attack Bob initiated on the target organization in the above scenario.

Options:

A.

Data modification

B.

Enumeration

C.

Session hijacking

D.

Buffer overflow

Buy Now
Questions 15

A disk drive has 16,384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data.

What is the total size of the disk?

Options:

A.

42,278,584,320 bytes

B.

42,278,584,340 bytes

C.

42,279,584,320 bytes

D.

43,278,584,320 bytes

Buy Now
Questions 16

James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.

Identify the tool employed by James in the above scenario.

Options:

A.

ESEDatabaseView

B.

ProcDump

C.

DriveLetterView

D.

PromiscDetect

Buy Now
Questions 17

Which of the following files belonging to the Extensible Storage Engine (ESE) stores the mail data in Microsoft Exchange Server?

Options:

A.

DataStore.edb

B.

Mail.MSMessageStore

C.

WLCalendarStore.edb

D.

Database.edb

Buy Now
Questions 18

Sarah, a forensic investigator, is working on a criminal case. She was provided with all the suspect devices. Sarah employs an imaging software tool for duplicating the original data from the suspect devices. However, the tool she employed failed to image the data as the suspect version of the drive was very old and incompatible with imaging software. Hence, Sarah used an alternative data acquisition technique and succeeded in imaging the data.

Which of the following types of data acquisition techniques did Sarah employ in the above scenario?

Options:

A.

Sparse acquisition

B.

Bit-stream disk-to-image-file

C.

Logical acquisition

D.

Bit-stream disk-to-disk

Buy Now
Questions 19

Which of the following layers of the TCP/IP model serves as the backbone for data flow between two devices in a network and enables peer entities on the source and destination devices to communicate with each other?

Options:

A.

Internet layer

B.

Network access layer

C.

Transport layer

D.

Application layer

Buy Now
Questions 20

In which of the following attacks does an attacker trick high-profile executives such as CEOs, CFOs, politicians, and celebrities to reveal critical corporate and personal information through email or website spoofing?

Options:

A.

Whaling

B.

Smishing

C.

Identity fraud

D.

Spimming

Buy Now
Questions 21

Clark, a digital forensic expert, was assigned to investigate a malicious activity performed on an organization’s network. The organization provided Clark with all the information related to the incident. In this process, he assessed the impact of the incident on the organization, reasons for and source of the incident, steps required to tackle the incident, investigation team required to handle the case, investigative procedures, and possible outcome of the forensic process.

Identify the type of analysis performed by Clark in the above scenario.

Options:

A.

Traffic analysis

B.

Case analysis

C.

Data analysis

D.

Log analysis

Buy Now
Questions 22

A forensic investigator is collecting volatile data such as system information and network information present in the registries, cache, DLLs, and RAM of digital devices through its normal interface.

Identify the data acquisition method the investigator is performing.

Options:

A.

Static acquisition

B.

Live acquisition

C.

Non-volatile data acquisition

D.

Dead acquisition

Buy Now

DEF |

Exam Code: 112-57
Exam Name: EC-Council Digital Forensics Essentials (DFE)
Last Update: Apr 12, 2026
Questions: 75
112-57 pdf

112-57 PDF

$25.5  $84.99
112-57 Engine

112-57 Testing Engine

$30  $99.99
112-57 PDF + Engine

112-57 PDF + Testing Engine

$40.5  $134.99