Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 112-57 Practice Exam with Questions & Answers

Questions 1

Which of the following hives in the Windows Registry hierarchical database is volatile in nature and contains file-extension association information and programmatic identifier (ProgID), Class ID (CLSID), and Interface ID (IID) data?

Options:
A.

HKEY_LOCAL_MACHINE

B.

HKEY_CURRENT_USER

C.

HKEY_CURRENT_CONFIG

D.

HKEY_CLASSES_ROOT

ECCouncil 112-57 Premium Access
Questions 2

Which of the following standards and criteria version of SWGDE mandates that any action with the potential to alter, damage, or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner?

Options:
A.

Standards and Criteria 1.3

B.

Standards and Criteria 1.7

C.

Standards and Criteria 1.5

D.

Standards and Criteria 1.1

Questions 3

Sarah, a forensic investigator, is working on a criminal case. She was provided with all the suspect devices. Sarah employs an imaging software tool for duplicating the original data from the suspect devices. However, the tool she employed failed to image the data as the suspect version of the drive was very old and incompatible with imaging software. Hence, Sarah used an alternative data acquisition technique and succeeded in imaging the data.

Which of the following types of data acquisition techniques did Sarah employ in the above scenario?

Options:
A.

Sparse acquisition

B.

Bit-stream disk-to-image-file

C.

Logical acquisition

D.

Bit-stream disk-to-disk

Questions 4

Sam is working as a loan agent for a financial institution. He frequently receives a number of emails from clients providing their personal details for loan approval. As these emails contain sensitive data, Sam had set up a feature that directly downloads the emails on his device without storing a copy on the mail server. Which of the following protocols provides the above-discussed email features?

Options:
A.

SHA-1

B.

ICMP

C.

POP3

D.

SNMP

Questions 5

Kelvin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kelvin decided to use an automated tool to recover the damaged, corrupted, or deleted files.

Which of the following forensic tools can help Kelvin in recovering deleted files?

Options:
A.

Ophcrack

B.

Cain & Abel

C.

R-Studio

D.

Rohos Mini Drive

Questions 6

Cooper, a forensic analyst, was examining a RAM dump extracted from a Linux system. In this process, he employed an automated tool, Volatility Framework, to identify any malicious code hidden inside the memory.

Which of the following plugins of the Volatility Framework helps Cooper detect hidden or injected files in the memory?

Options:
A.

linux_malfind

B.

linux_netstat

C.

ip addr show

D.

nmap -sU localhost

Questions 7

Below is the syntax of a command-line utility that displays active TCP connections and ports on which the computer is listening.

netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]

Identify the netstat parameter that displays active TCP connections and includes the process ID (PID) for each connection.

Options:
A.

[-n]

B.

[-a]

C.

[-o]

D.

[-s]

Questions 8

Alice and John are close college friends. Alice frequently sends emails to John attaching her pics with friends. One day, Alice sent an email to John describing all the details related to the final year project without specifying the actual purpose. John missed the message as he frequently receives emails from her and did not arrive for a project seminar.

Which of the following email fields could Alice have used in the above scenario to highlight the importance of the email?

Options:
A.

Subject

B.

Date

C.

Cc

D.

Bcc

Questions 9

Which of the following folders of macOS stores all the files, documents, applications, library folders, etc. pertaining to a particular user?

Options:
A.

Spotlight

B.

Time Machine

C.

Finder

D.

Home Directory

Questions 10

Bob, a forensic specialist at a newly established NGO, discovered a security loophole in the NGO’s web application, which unintentionally reveals early enrolled NGO members’ biodata to attackers. Bob immediately employed a content filtering mechanism to protect all the NGO’s data sources and prevent further damage.

Identify the web application threat identified by Bob in the above scenario.

Options:
A.

Buffer overflow

B.

Information leakage

C.

Authentication hijacking

D.

Cookie poisoning