Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

112-57 EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Questions 4

Which of the following hives in the Windows Registry hierarchical database is volatile in nature and contains file-extension association information and programmatic identifier (ProgID), Class ID (CLSID), and Interface ID (IID) data?

Options:

A.

HKEY_LOCAL_MACHINE

B.

HKEY_CURRENT_USER

C.

HKEY_CURRENT_CONFIG

D.

HKEY_CLASSES_ROOT

Buy Now
Questions 5

Philip, a forensic officer, was tasked with investigating a crime scene. In this process, he created bit-by-bit copies of the suspect drive and retrieved all the disk images using the dd command.

Which of the following data acquisition image formats is extracted by Philip in the above scenario?

Options:

A.

Raw Format

B.

Advanced Forensic Framework 4 (AFF4)

C.

Advanced Forensics Format (AFF)

D.

Proprietary Format

Buy Now
Questions 6

Which of the following techniques is defined as the art of hiding data “behind” other data without the target’s knowledge, thereby hiding the existence of the message itself?

Options:

A.

Password cracking

B.

Artifact wiping

C.

Steganography

D.

Program packer

Buy Now
Questions 7

Jack, a forensic investigator, was appointed to investigate a Windows-based security incident. In this process, he employed an Autopsy tool to recover the deleted files from unallocated space, which helps in gathering potential evidence.

Which of the following functions of Autopsy helped Jack recover the deleted files?

Options:

A.

Timeline analysis

B.

Multimedia

C.

Web artifacts

D.

Data carving

Buy Now
Questions 8

In which of the following attacks does an attacker trick high-profile executives such as CEOs, CFOs, politicians, and celebrities to reveal critical corporate and personal information through email or website spoofing?

Options:

A.

Whaling

B.

Smishing

C.

Identity fraud

D.

Spimming

Buy Now
Questions 9

Which of the following NTFS system files contains a record of every file present in the system?

Options:

A.

$quota

B.

$mft

C.

$volume

D.

$logfile

Buy Now
Questions 10

Which of the following steps in forensic readiness planning provides a backup for future reference and assists in presenting evidence in a court of law?

Options:

A.

Creating a process for documenting the procedure

B.

Identifying the potential evidence required for an incident

C.

Determining the sources of evidence

D.

Keeping an incident response team ready to review the incident

Buy Now
Questions 11

Sandra, a hacker, targeted Johana, a software professional, to steal her banking details. She started sending frequent, random pop-up messages with malicious links to her social media page. Johana accidentally clicked on a link, causing a malicious program to get installed in her system. Subsequently, when Johana attempted to access her banking website, the URL redirected her to a malicious website controlled by Sandra. Johana entered her banking credentials on the fake website, which Sandra then captured.

Identify the type of attack performed by Sandra on Johana.

Options:

A.

Pharming

B.

Tailgating

C.

Dumpster diving

D.

Shoulder surfing

Buy Now
Questions 12

Below is the syntax of a command-line utility that displays active TCP connections and ports on which the computer is listening.

netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]

Identify the netstat parameter that displays active TCP connections and includes the process ID (PID) for each connection.

Options:

A.

[-n]

B.

[-a]

C.

[-o]

D.

[-s]

Buy Now
Questions 13

Which of the following layers of the TCP/IP model includes protocols such as Frame Relay, SMDS, Fast Ethernet, SLIP, PPP, FDDI, ATM, Ethernet, and ARP to enable a machine to deliver the desired data to other hosts in the same network?

Options:

A.

Network access layer

B.

Transport layer

C.

Application layer

D.

Internet layer

Buy Now
Questions 14

Which of the following Windows system files is created in the system drive after OS installation to support the internal functions and system service dispatch stubs to executive functions?

Options:

A.

Ntoskrnl.exe

B.

Win32k.sys

C.

Ntdll.dll

D.

Kernel32.dll

Buy Now
Questions 15

Kelly, a professional hacker, used her laptop to perform illegal cyber activities for monetary gain on many victims. She securely locked her laptop using BitLocker software. Using this tool, she locked an entire volume using a secret key to deny access to the system.

Identify the anti-forensic technique used by Don in the above scenario.

Options:

A.

File carving

B.

Artifact wiping

C.

Trail obfuscation

D.

Encryption

Buy Now
Questions 16

A disk drive has 16,384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data.

What is the total size of the disk?

Options:

A.

42,278,584,320 bytes

B.

42,278,584,340 bytes

C.

42,279,584,320 bytes

D.

43,278,584,320 bytes

Buy Now
Questions 17

While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:

C:> net view <\10.10.10.11>

What was Jessy’s objective in running the above command?

Options:

A.

Check file space usage to look for a sudden decrease in free space

B.

Review file shares to ensure their purpose

C.

Check whether sessions have been opened with other systems

D.

Verify the users using open sessions

Buy Now
Questions 18

Cheryl, a forensic expert, was recruited to investigate a malicious activity performed by an anonymous hackers’ group on an organization’s systems. Using an automated tool, Cheryl was able to extract the malware file and analyze the assembly code instructions, which helped him understand the malware’s purpose.

Which of the following tools helped Cheryl extract and analyze the assembly code of the malware?

Options:

A.

Virtual Box

B.

QualNet

C.

OllyDbg

D.

VMware vSphere

Buy Now
Questions 19

Which of the following titles of The Electronic Communications Privacy Act protects the privacy of the contents of files stored by service providers and records held about the subscriber by service providers, such as subscriber name, billing records, and IP addresses?

Options:

A.

Title II

B.

Title IV

C.

Title III

D.

Title I

Buy Now
Questions 20

Sam is working as a loan agent for a financial institution. He frequently receives a number of emails from clients providing their personal details for loan approval. As these emails contain sensitive data, Sam had set up a feature that directly downloads the emails on his device without storing a copy on the mail server. Which of the following protocols provides the above-discussed email features?

Options:

A.

SHA-1

B.

ICMP

C.

POP3

D.

SNMP

Buy Now
Questions 21

Identify the malware analysis technique in which the investigators must take a snapshot of the baseline state of the forensic workstation before malware execution.

Options:

A.

Online malware scanning

B.

Monitoring host integrity

C.

String search

D.

File fingerprinting

Buy Now
Questions 22

Which of the following network protocols creates secure tunneling through which content obfuscation can be achieved?

Options:

A.

SNMP

B.

ARP

C.

SSH

D.

UDP

Buy Now
Exam Code: 112-57
Exam Name: EC-Council Digital Forensics Essentials (DFE)
Last Update: Apr 4, 2026
Questions: 75

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99