Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

112-57 Exam Dumps - ECCouncil DEF Questions and Answers

Question # 14

Bob, a forensic investigator, is investigating a live Windows system found at a crime scene. In this process, Bob extracted subkeys containing information such as SAM, Security, and software using an automated tool called FTK Imager.

Which of the following Windows Registry hives’ subkeys provide the above information to Bob?

Options:

A.

HKEY_CLASSES_ROOT

B.

HKEY_LOCAL_MACHINE

C.

HKEY_CURRENT_USER

D.

HKEY_CURRENT_CONFIG

Buy Now
Question # 15

Below is the syntax of a command-line utility that displays active TCP connections and ports on which the computer is listening.

netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]

Identify the netstat parameter that displays active TCP connections and includes the process ID (PID) for each connection.

Options:

A.

[-n]

B.

[-a]

C.

[-o]

D.

[-s]

Buy Now
Question # 16

Which of the following file systems is developed by Apple to support Mac OS in its proprietary Macintosh system and replace the Macintosh File System (MFS)?

Options:

A.

New Technology File System

B.

Apple File System

C.

Filesystem Hierarchy Standard

D.

Hierarchical File System

Buy Now
Question # 17

Bob, a security specialist at an organization, extracted the following IIS log from a Windows-based server:

“2019-12-12 06:11:41 192.168.0.10 GET /images/content/bg_body1.jpg - 80 - 192.168.0.27 Mozilla/5.0+(Windows+NT+6.3;+WOW64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/48.0.2564.103+Safari/537.36 http://www.moviescope.com/css/style.css 200 0 0 365”

Identify the element in the above IIS log entry that indicates the request was fulfilled without error.

Options:

A.

537

B.

80

C.

200

D.

192

Buy Now
Question # 18

Wesley, a professional hacker, deleted a confidential file in a compromised system using the “/bin/rm/” command to deny access to forensic specialists.

Identify the operating system on which Don has performed the file carving act.

Options:

A.

Windows

B.

Android

C.

Mac OS

D.

Linux

Buy Now
Question # 19

Which of the following file systems of Windows replaces the first letter of a deleted file name with the hex byte code “e5h”?

Options:

A.

FAT

B.

FHS

C.

NTFS

D.

EFS

Buy Now
Question # 20

Which of the following techniques is used to compute the hash value for a given binary code to uniquely identify malware or periodically verify changes made to the binary code during analysis?

Options:

A.

File fingerprinting

B.

Strings search

C.

Local and online malware scanning

D.

Malware disassembly

Buy Now
Question # 21

Which of the following network protocols creates secure tunneling through which content obfuscation can be achieved?

Options:

A.

SNMP

B.

ARP

C.

SSH

D.

UDP

Buy Now
Question # 22

Which of the following measures is defined as the time to move read or write disc heads from one point to another on the disk?

Options:

A.

Delay time

B.

Access time

C.

Seek time

D.

Mean time

Buy Now
Question # 23

Kelvin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kelvin decided to use an automated tool to recover the damaged, corrupted, or deleted files.

Which of the following forensic tools can help Kelvin in recovering deleted files?

Options:

A.

Ophcrack

B.

Cain & Abel

C.

R-Studio

D.

Rohos Mini Drive

Buy Now
Exam Code: 112-57
Exam Name: EC-Council Digital Forensics Essentials (DFE)
Last Update: Mar 1, 2026
Questions: 75
112-57 pdf

112-57 PDF

$25.5  $84.99
112-57 Engine

112-57 Testing Engine

$28.5  $94.99
112-57 PDF + Engine

112-57 PDF + Testing Engine

$40.5  $134.99