Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ECCouncil 112-57 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following acts was passed by the U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations?

Options:
A.

The Electronic Communications Privacy Act

B.

General Data Protection Regulation (GDPR)

C.

Sarbanes–Oxley Act (SOX)

D.

Information Privacy Act 2014

ECCouncil 112-57 Premium Access
Questions 12

Bob, a security specialist at an organization, extracted the following IIS log from a Windows-based server:

“2019-12-12 06:11:41 192.168.0.10 GET /images/content/bg_body1.jpg - 80 - 192.168.0.27 Mozilla/5.0+(Windows+NT+6.3;+WOW64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/48.0.2564.103+Safari/537.36 http://www.moviescope.com/css/style.css 200 0 0 365”

Identify the element in the above IIS log entry that indicates the request was fulfilled without error.

Options:
A.

537

B.

80

C.

200

D.

192

Questions 13

Which of the following MAC forensic data components saves file information and related events using a token with a binary structure?

Options:
A.

Command-line inputs

B.

User account

C.

Basic Security Module

D.

Kexts

Questions 14

Which of the following layers of the TCP/IP model includes protocols such as Frame Relay, SMDS, Fast Ethernet, SLIP, PPP, FDDI, ATM, Ethernet, and ARP to enable a machine to deliver the desired data to other hosts in the same network?

Options:
A.

Network access layer

B.

Transport layer

C.

Application layer

D.

Internet layer

Questions 15

Below are the various steps involved in an email crime investigation.

1.Acquiring the email data

2.Analyzing email headers

3.Examining email messages

4.Recovering deleted email messages

5.Seizing the computer and email accounts

6.Retrieving email headers

What is the correct sequence of steps involved in the investigation of an email crime?

Options:
A.

5-->1-->3-->6-->2-->4

B.

2-->4-->3-->6-->5-->1

C.

1-->3-->6-->4-->5-->2

D.

1-->3-->4-->2-->5-->6

Questions 16

Which of the following techniques is used to compute the hash value for a given binary code to uniquely identify malware or periodically verify changes made to the binary code during analysis?

Options:
A.

File fingerprinting

B.

Strings search

C.

Local and online malware scanning

D.

Malware disassembly

Questions 17

Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization’s network.

Identify the type of network attack Bob initiated on the target organization in the above scenario.

Options:
A.

Data modification

B.

Enumeration

C.

Session hijacking

D.

Buffer overflow

Questions 18

Jack, a forensic investigator, was appointed by an organization to perform a security audit on a Linux system. In this process, Jack collected information about the present status of the system and listed all the applications running on various ports to detect malicious programs.

Which of the following commands can help Jack determine any programs/processes associated with open ports?

Options:
A.

netstat -i

B.

ip r

C.

netstat -rn

D.

netstat -tulpn

Questions 19

Clark, a digital forensic expert, was assigned to investigate a malicious activity performed on an organization’s network. The organization provided Clark with all the information related to the incident. In this process, he assessed the impact of the incident on the organization, reasons for and source of the incident, steps required to tackle the incident, investigation team required to handle the case, investigative procedures, and possible outcome of the forensic process.

Identify the type of analysis performed by Clark in the above scenario.

Options:
A.

Traffic analysis

B.

Case analysis

C.

Data analysis

D.

Log analysis

Questions 20

Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.

Identify the role played by Jennifer in the forensics investigation.

Options:
A.

Incident responder

B.

Incident analyzer

C.

Evidence manager

D.

Expert witness