Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil DEF 112-57 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following network protocols creates secure tunneling through which content obfuscation can be achieved?

Options:

A.

SNMP


B.

ARP


C.

SSH


D.

UDP


Expert Solution
Questions # 2:

Sam is working as a loan agent for a financial institution. He frequently receives a number of emails from clients providing their personal details for loan approval. As these emails contain sensitive data, Sam had set up a feature that directly downloads the emails on his device without storing a copy on the mail server. Which of the following protocols provides the above-discussed email features?

Options:

A.

SHA-1


B.

ICMP


C.

POP3


D.

SNMP


Expert Solution
Questions # 3:

Bob, a forensic investigator, is investigating a live Windows system found at a crime scene. In this process, Bob extracted subkeys containing information such as SAM, Security, and software using an automated tool called FTK Imager.

Which of the following Windows Registry hives’ subkeys provide the above information to Bob?

Options:

A.

HKEY_CLASSES_ROOT


B.

HKEY_LOCAL_MACHINE


C.

HKEY_CURRENT_USER


D.

HKEY_CURRENT_CONFIG


Expert Solution
Questions # 4:

Bob, a forensic specialist at a newly established NGO, discovered a security loophole in the NGO’s web application, which unintentionally reveals early enrolled NGO members’ biodata to attackers. Bob immediately employed a content filtering mechanism to protect all the NGO’s data sources and prevent further damage.

Identify the web application threat identified by Bob in the above scenario.

Options:

A.

Buffer overflow


B.

Information leakage


C.

Authentication hijacking


D.

Cookie poisoning


Expert Solution
Questions # 5:

Which of the following data acquisition formats supports the Lempel-Ziv–Markov chain (LZMA) algorithm for compression?

Options:

A.

Raw Format


B.

Advanced Forensics Format


C.

Advanced ForensicFramework 4


D.

Proprietary Format


Expert Solution
Questions # 6:

Bob, a forensic investigator, was instructed to review a Windows machine and identify any anonymous activities performed using it. In this process, Bob used the command “netstat -ano” to view all the active connections in the system and determined that the connections established by the Tor browser were closed.

Which of the following states of the connections established by Tor indicates that the Tor browser is closed?

Options:

A.

CLOSE_WAIT


B.

TIME_WAIT


C.

ESTABLISHED


D.

LISTENING


Expert Solution
Questions # 7:

Identify the investigation team member who is responsible for evidence gathered at the crime scene and maintains a record of the evidence, making it admissible in a court of law.

Options:

A.

Incident analyzer


B.

Evidence examiner


C.

Incident responder


D.

Evidence manager


Expert Solution
Questions # 8:

John, a forensic officer, was working on a criminal case. He employed imaging software to create a copy of data from the suspect device on a storage medium for further investigation. For developing an image of the original data, John used a software application that does not allow an unauthorized user to alter the image content on storage media, thereby retaining an unaltered image copy.

Identify the data acquisition step performed by John in the above scenario.

Options:

A.

Enabled write protection on the evidence media


B.

Validated data acquisition


C.

Sanitized the target media


D.

Planned for contingency


Expert Solution
Questions # 9:

Which of the following file systems of Windows replaces the first letter of a deleted file name with the hex byte code “e5h”?

Options:

A.

FAT


B.

FHS


C.

NTFS


D.

EFS


Expert Solution
Questions # 10:

Bob, a security specialist at an organization, extracted the following IIS log from a Windows-based server:

“2019-12-12 06:11:41 192.168.0.10 GET /images/content/bg_body1.jpg - 80 - 192.168.0.27 Mozilla/5.0+(Windows+NT+6.3;+WOW64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/48.0.2564.103+Safari/537.36 http://www.moviescope.com/css/style.css 200 0 0 365”

Identify the element in the above IIS log entry that indicates the request was fulfilled without error.

Options:

A.

537


B.

80


C.

200


D.

192


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions