Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil DEF 112-57 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Given below are different steps involved in event correlation.

Event masking

Event aggregation

Root cause analysis

Event filtering

Identify the correct sequence of steps involved in event correlation.

Options:

A.

1-->3-->2-->4


B.

2-->1-->4-->3


C.

1-->3-->4-->2


D.

2-->4-->3-->1


Expert Solution
Questions # 12:

An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose, Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locations and techniques.

Identify the type of device deployed by Steven in the above scenario.

Options:

A.

Intrusion detection system


B.

Firewall


C.

Honeypot


D.

Router


Expert Solution
Questions # 13:

Cooper, a forensic analyst, was examining a RAM dump extracted from a Linux system. In this process, he employed an automated tool, Volatility Framework, to identify any malicious code hidden inside the memory.

Which of the following plugins of the Volatility Framework helps Cooper detect hidden or injected files in the memory?

Options:

A.

linux_malfind


B.

linux_netstat


C.

ip addr show


D.

nmap -sU localhost


Expert Solution
Questions # 14:

Below is the syntax of a command-line utility that displays active TCP connections and ports on which the computer is listening.

netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]

Identify the netstat parameter that displays active TCP connections and includes the process ID (PID) for each connection.

Options:

A.

[-n]


B.

[-a]


C.

[-o]


D.

[-s]


Expert Solution
Questions # 15:

Below are the various steps involved in an email crime investigation.

1.Acquiring the email data

2.Analyzing email headers

3.Examining email messages

4.Recovering deleted email messages

5.Seizing the computer and email accounts

6.Retrieving email headers

What is the correct sequence of steps involved in the investigation of an email crime?

Options:

A.

5-->1-->3-->6-->2-->4


B.

2-->4-->3-->6-->5-->1


C.

1-->3-->6-->4-->5-->2


D.

1-->3-->4-->2-->5-->6


Expert Solution
Questions # 16:

James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.

Identify the tool employed by James in the above scenario.

Options:

A.

ESEDatabaseView


B.

ProcDump


C.

DriveLetterView


D.

PromiscDetect


Expert Solution
Questions # 17:

Which of the following NTFS system files contains a record of every file present in the system?

Options:

A.

$quota


B.

$mft


C.

$volume


D.

$logfile


Expert Solution
Questions # 18:

While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:

C:> net view <\10.10.10.11>

What was Jessy’s objective in running the above command?

Options:

A.

Check file space usage to look for a sudden decrease in free space


B.

Review file shares to ensure their purpose


C.

Check whether sessions have been opened with other systems


D.

Verify the users using open sessions


Expert Solution
Questions # 19:

Which of the following file systems is developed by Apple to support Mac OS in its proprietary Macintosh system and replace the Macintosh File System (MFS)?

Options:

A.

New Technology File System


B.

Apple File System


C.

Filesystem Hierarchy Standard


D.

Hierarchical File System


Expert Solution
Questions # 20:

A disk drive has 16,384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data.

What is the total size of the disk?

Options:

A.

42,278,584,320 bytes


B.

42,278,584,340 bytes


C.

42,279,584,320 bytes


D.

43,278,584,320 bytes


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions