Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

112-57 Exam Dumps - ECCouncil DEF Questions and Answers

Question # 4

Jack, a forensic investigator, was appointed by an organization to perform a security audit on a Linux system. In this process, Jack collected information about the present status of the system and listed all the applications running on various ports to detect malicious programs.

Which of the following commands can help Jack determine any programs/processes associated with open ports?

Options:

A.

netstat -i

B.

ip r

C.

netstat -rn

D.

netstat -tulpn

Buy Now
Question # 5

Below are the various steps involved in forensic readiness planning.

Keep an incident response team ready to review the incident and preserve the evidence.

Create a process for documenting the procedure.

Identify the potential evidence required for an incident.

Determine the sources of evidence.

Establish a legal advisory board to guide the investigation process.

Identify if the incident requires full or formal investigation.

Establish a policy for securely handling and storing the collected evidence.

Define a policy that determines the pathway to legally extract electronic evidence with minimal disruption.

Identify the correct sequence of steps involved in forensic readiness planning.

Options:

A.

3-->4-->8-->7-->6-->2-->5-->1

B.

2-->3-->1-->4-->6-->5-->7-->8

C.

3-->1-->4-->5-->8-->2-->6-->7

D.

1-->2-->3-->4-->5-->6-->7-->8

Buy Now
Question # 6

Harry, a security professional, was hired to identify the details of an attack that was initiated on a Windows system. In this process, Harry decided to check the logs of currently running applications and the information related to previously uninstalled or removed applications for suspicious events.

Which of the following folders in a Windows system stores information on applications run on the system?

Options:

A.

C:\Windows\Book

B.

C:\subdir

C.

C:\Windows\Prefetch

D.

C:\Windows\debug

Buy Now
Question # 7

Which of the following hives in the Windows Registry hierarchical database is volatile in nature and contains file-extension association information and programmatic identifier (ProgID), Class ID (CLSID), and Interface ID (IID) data?

Options:

A.

HKEY_LOCAL_MACHINE

B.

HKEY_CURRENT_USER

C.

HKEY_CURRENT_CONFIG

D.

HKEY_CLASSES_ROOT

Buy Now
Question # 8

Which of the following standards and criteria version of SWGDE mandates that any action with the potential to alter, damage, or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner?

Options:

A.

Standards and Criteria 1.3

B.

Standards and Criteria 1.7

C.

Standards and Criteria 1.5

D.

Standards and Criteria 1.1

Buy Now
Question # 9

In which of the following malware distribution techniques does the attacker use tactics such as keyword stuffing, doorway pages, page swapping, and adding unrelated keywords to improve the search-engine ranking of their malware pages?

Options:

A.

Drive-by downloads

B.

Spearphishing sites

C.

Black-hat search-engine optimization

D.

Social-engineered clickjacking

Buy Now
Question # 10

Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization’s network.

Identify the type of network attack Bob initiated on the target organization in the above scenario.

Options:

A.

Data modification

B.

Enumeration

C.

Session hijacking

D.

Buffer overflow

Buy Now
Question # 11

Which of the following techniques is defined as the art of hiding data “behind” other data without the target’s knowledge, thereby hiding the existence of the message itself?

Options:

A.

Password cracking

B.

Artifact wiping

C.

Steganography

D.

Program packer

Buy Now
Question # 12

Benoy, a security professional at an organization, extracted Apache access log entries to view critical information about all the operations performed on a web server. The Apache access log extracted by Benoy is given below:

“10.10.10.10 - Jason [17/Aug/2019:00:12:34 +0300] "GET /images/content/bg_body_1.jpg HTTP/1.0" 500 1458”

Identify the HTTP status code in the Apache access log entry above that indicates the response was successful.

Options:

A.

+0300

B.

500

C.

1.0

D.

2019

Buy Now
Question # 13

A forensic investigator is collecting volatile data such as system information and network information present in the registries, cache, DLLs, and RAM of digital devices through its normal interface.

Identify the data acquisition method the investigator is performing.

Options:

A.

Static acquisition

B.

Live acquisition

C.

Non-volatile data acquisition

D.

Dead acquisition

Buy Now
Exam Code: 112-57
Exam Name: EC-Council Digital Forensics Essentials (DFE)
Last Update: Feb 28, 2026
Questions: 75
112-57 pdf

112-57 PDF

$25.5  $84.99
112-57 Engine

112-57 Testing Engine

$28.5  $94.99
112-57 PDF + Engine

112-57 PDF + Testing Engine

$40.5  $134.99