Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

112-57 EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Questions 4

Which of the following Windows system files is created in the system drive after OS installation to support the internal functions and system service dispatch stubs to executive functions?

Options:

A.

Ntoskrnl.exe

B.

Win32k.sys

C.

Ntdll.dll

D.

Kernel32.dll

Buy Now
Questions 5

Philip, a forensic officer, was tasked with investigating a crime scene. In this process, he created bit-by-bit copies of the suspect drive and retrieved all the disk images using the dd command.

Which of the following data acquisition image formats is extracted by Philip in the above scenario?

Options:

A.

Raw Format

B.

Advanced Forensic Framework 4 (AFF4)

C.

Advanced Forensics Format (AFF)

D.

Proprietary Format

Buy Now
Questions 6

Which of the following techniques is defined as the art of hiding data “behind” other data without the target’s knowledge, thereby hiding the existence of the message itself?

Options:

A.

Password cracking

B.

Artifact wiping

C.

Steganography

D.

Program packer

Buy Now
Questions 7

A government organization decided to establish a computer forensics lab to perform transparent investigation processes on highly sensitive cases. The organization also decided to establish strong physical security around the premises of the forensics lab.

Which of the following security measures helps the organization in providing strong physical security to the forensics lab?

Options:

A.

Never place fire extinguishers in and outside the lab

B.

Do not maintain a log register at the entrance of the lab

C.

Shield workstations from transmitting electromagnetic signals

D.

Never keep the lab under surveillance

Buy Now
Questions 8

Bob, a forensic investigator, was instructed to review a Windows machine and identify any anonymous activities performed using it. In this process, Bob used the command “netstat -ano” to view all the active connections in the system and determined that the connections established by the Tor browser were closed.

Which of the following states of the connections established by Tor indicates that the Tor browser is closed?

Options:

A.

CLOSE_WAIT

B.

TIME_WAIT

C.

ESTABLISHED

D.

LISTENING

Buy Now
Questions 9

Which of the following measures is defined as the time to move read or write disc heads from one point to another on the disk?

Options:

A.

Delay time

B.

Access time

C.

Seek time

D.

Mean time

Buy Now
Questions 10

Kane, an investigation specialist, was appointed to investigate an incident in an organization's network. In this process, Kane executed a command and identified that a network interface is running in the promiscuous mode and is allowing all incoming packets without any restriction.

In the above scenario, which of the following commands did Kane use to check whether the network interface is set to the promiscuous mode?

Options:

A.

nmap -sT localhost

B.

ipconfig

C.

ifconfig

D.

netstat -i

Buy Now
Questions 11

In which of the following attacks does an attacker trick high-profile executives such as CEOs, CFOs, politicians, and celebrities to reveal critical corporate and personal information through email or website spoofing?

Options:

A.

Whaling

B.

Smishing

C.

Identity fraud

D.

Spimming

Buy Now
Questions 12

Which of the following file systems of Windows replaces the first letter of a deleted file name with the hex byte code “e5h”?

Options:

A.

FAT

B.

FHS

C.

NTFS

D.

EFS

Buy Now
Questions 13

Which of the following files belonging to the Extensible Storage Engine (ESE) stores the mail data in Microsoft Exchange Server?

Options:

A.

DataStore.edb

B.

Mail.MSMessageStore

C.

WLCalendarStore.edb

D.

Database.edb

Buy Now
Questions 14

Alice and John are close college friends. Alice frequently sends emails to John attaching her pics with friends. One day, Alice sent an email to John describing all the details related to the final year project without specifying the actual purpose. John missed the message as he frequently receives emails from her and did not arrive for a project seminar.

Which of the following email fields could Alice have used in the above scenario to highlight the importance of the email?

Options:

A.

Subject

B.

Date

C.

Cc

D.

Bcc

Buy Now
Questions 15

Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?

Options:

A.

MZHistoryView

B.

BrowsingHistoryView

C.

MZCacheView

D.

ChromeHistoryView

Buy Now
Questions 16

Identify the investigation team member who is responsible for evidence gathered at the crime scene and maintains a record of the evidence, making it admissible in a court of law.

Options:

A.

Incident analyzer

B.

Evidence examiner

C.

Incident responder

D.

Evidence manager

Buy Now
Questions 17

Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.

Identify the role played by Jennifer in the forensics investigation.

Options:

A.

Incident responder

B.

Incident analyzer

C.

Evidence manager

D.

Expert witness

Buy Now
Questions 18

Cooper, a forensic analyst, was examining a RAM dump extracted from a Linux system. In this process, he employed an automated tool, Volatility Framework, to identify any malicious code hidden inside the memory.

Which of the following plugins of the Volatility Framework helps Cooper detect hidden or injected files in the memory?

Options:

A.

linux_malfind

B.

linux_netstat

C.

ip addr show

D.

nmap -sU localhost

Buy Now
Questions 19

Which of the following folders of macOS stores all the files, documents, applications, library folders, etc. pertaining to a particular user?

Options:

A.

Spotlight

B.

Time Machine

C.

Finder

D.

Home Directory

Buy Now
Questions 20

Williams, a forensic specialist, was tasked with performing a static malware analysis on a suspect system in an organization. For this purpose, Williams used an automated tool to perform a string search and saved all the identified strings in a text file. After analyzing the strings, he determined all the harmful actions that were performed by malware.

Identify the tool employed by Williams in the above scenario.

Options:

A.

R-Drive Image

B.

ResourcesExtract

C.

Ezvid

D.

Snagit

Buy Now
Questions 21

Michael, a forensic expert, was assigned to investigate an incident that involved unauthorized intrusion attempts. In this process, Michael identified all the open ports on a system and disabled them because these open ports can allow attackers to install malicious services and compromise the security of the system or network.

Which of the following commands assisted Michael in identifying open ports in the above scenario?

Options:

A.

netstat -i

B.

netstat -rn

C.

nmap -sT localhost

D.

ifconfig -promisc

Buy Now
Questions 22

In which of the following malware distribution techniques does the attacker use tactics such as keyword stuffing, doorway pages, page swapping, and adding unrelated keywords to improve the search-engine ranking of their malware pages?

Options:

A.

Drive-by downloads

B.

Spearphishing sites

C.

Black-hat search-engine optimization

D.

Social-engineered clickjacking

Buy Now
Exam Code: 112-57
Exam Name: EC-Council Digital Forensics Essentials (DFE)
Last Update: Feb 28, 2026
Questions: 75
112-57 pdf

112-57 PDF

$25.5  $84.99
112-57 Engine

112-57 Testing Engine

$30  $99.99
112-57 PDF + Engine

112-57 PDF + Testing Engine

$40.5  $134.99