Spring Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the ECCouncil DEF 112-57 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 112-57 Premium Access

View all detail and faqs for the 112-57 exam


375 Students Passed

84% Average Score

91% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Kane, an investigation specialist, was appointed to investigate an incident in an organization's network. In this process, Kane executed a command and identified that a network interface is running in the promiscuous mode and is allowing all incoming packets without any restriction.

In the above scenario, which of the following commands did Kane use to check whether the network interface is set to the promiscuous mode?

Options:

A.

nmap -sT localhost

B.

ipconfig

C.

ifconfig

D.

netstat -i

Questions # 2:

Which of the following hives in the Windows Registry hierarchical database is volatile in nature and contains file-extension association information and programmatic identifier (ProgID), Class ID (CLSID), and Interface ID (IID) data?

Options:

A.

HKEY_LOCAL_MACHINE

B.

HKEY_CURRENT_USER

C.

HKEY_CURRENT_CONFIG

D.

HKEY_CLASSES_ROOT

Questions # 3:

Below are the various steps involved in an email crime investigation.

1.Acquiring the email data

2.Analyzing email headers

3.Examining email messages

4.Recovering deleted email messages

5.Seizing the computer and email accounts

6.Retrieving email headers

What is the correct sequence of steps involved in the investigation of an email crime?

Options:

A.

5-->1-->3-->6-->2-->4

B.

2-->4-->3-->6-->5-->1

C.

1-->3-->6-->4-->5-->2

D.

1-->3-->4-->2-->5-->6

Questions # 4:

Which of the following data acquisition formats supports the Lempel-Ziv–Markov chain (LZMA) algorithm for compression?

Options:

A.

Raw Format

B.

Advanced Forensics Format

C.

Advanced ForensicFramework 4

D.

Proprietary Format

Questions # 5:

Which of the following MAC forensic data components saves file information and related events using a token with a binary structure?

Options:

A.

Command-line inputs

B.

User account

C.

Basic Security Module

D.

Kexts

Questions # 6:

Which of the following commands can an investigator use to parse GPTs of both types of hard disks, including those formatted with either UEFI or MBR?

Options:

A.

Get-BootSector

B.

Get-PartitionTable

C.

Get-ForensicPartitionTable

D.

Get-GPT

Questions # 7:

Identify the malware analysis technique in which the investigators must take a snapshot of the baseline state of the forensic workstation before malware execution.

Options:

A.

Online malware scanning

B.

Monitoring host integrity

C.

String search

D.

File fingerprinting

Questions # 8:

An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose, Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locations and techniques.

Identify the type of device deployed by Steven in the above scenario.

Options:

A.

Intrusion detection system

B.

Firewall

C.

Honeypot

D.

Router

Questions # 9:

James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.

Identify the tool employed by James in the above scenario.

Options:

A.

ESEDatabaseView

B.

ProcDump

C.

DriveLetterView

D.

PromiscDetect

Questions # 10:

A disk drive has 16,384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data.

What is the total size of the disk?

Options:

A.

42,278,584,320 bytes

B.

42,278,584,340 bytes

C.

42,279,584,320 bytes

D.

43,278,584,320 bytes

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.