Pre-Summer Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

EC-Council Digital Forensics Essentials (DFE) Question and Answers

EC-Council Digital Forensics Essentials (DFE)

Last Update Apr 11, 2026
Total Questions : 75

We are offering FREE 112-57 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 112-57 free exam questions and then go for complete pool of EC-Council Digital Forensics Essentials (DFE) test questions that will help you more.

112-57 pdf

112-57 PDF

$36.75  $104.99
112-57 Engine

112-57 Testing Engine

$43.75  $124.99
112-57 PDF + Engine

112-57 PDF + Testing Engine

$57.75  $164.99
Questions 1

Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?

Options:

A.  

MZHistoryView

B.  

BrowsingHistoryView

C.  

MZCacheView

D.  

ChromeHistoryView

Discussion 0
Questions 2

Philip, a forensic officer, was tasked with investigating a crime scene. In this process, he created bit-by-bit copies of the suspect drive and retrieved all the disk images using the dd command.

Which of the following data acquisition image formats is extracted by Philip in the above scenario?

Options:

A.  

Raw Format

B.  

Advanced Forensic Framework 4 (AFF4)

C.  

Advanced Forensics Format (AFF)

D.  

Proprietary Format

Discussion 0
Questions 3

Which of the following hives in the Windows Registry hierarchical database is volatile in nature and contains file-extension association information and programmatic identifier (ProgID), Class ID (CLSID), and Interface ID (IID) data?

Options:

A.  

HKEY_LOCAL_MACHINE

B.  

HKEY_CURRENT_USER

C.  

HKEY_CURRENT_CONFIG

D.  

HKEY_CLASSES_ROOT

Discussion 0
Questions 4

Identify the malware analysis technique in which the investigators must take a snapshot of the baseline state of the forensic workstation before malware execution.

Options:

A.  

Online malware scanning

B.  

Monitoring host integrity

C.  

String search

D.  

File fingerprinting

Discussion 0
Questions 5

Benoy, a security professional at an organization, extracted Apache access log entries to view critical information about all the operations performed on a web server. The Apache access log extracted by Benoy is given below:

“10.10.10.10 - Jason [17/Aug/2019:00:12:34 +0300] "GET /images/content/bg_body_1.jpg HTTP/1.0" 500 1458”

Identify the HTTP status code in the Apache access log entry above that indicates the response was successful.

Options:

A.  

+0300

B.  

500

C.  

1.0

D.  

2019

Discussion 0
Questions 6

James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.

Identify the tool employed by James in the above scenario.

Options:

A.  

ESEDatabaseView

B.  

ProcDump

C.  

DriveLetterView

D.  

PromiscDetect

Discussion 0
Questions 7

Which of the following data acquisition formats supports the Lempel-Ziv–Markov chain (LZMA) algorithm for compression?

Options:

A.  

Raw Format

B.  

Advanced Forensics Format

C.  

Advanced ForensicFramework 4

D.  

Proprietary Format

Discussion 0
Questions 8

Kelly, a professional hacker, used her laptop to perform illegal cyber activities for monetary gain on many victims. She securely locked her laptop using BitLocker software. Using this tool, she locked an entire volume using a secret key to deny access to the system.

Identify the anti-forensic technique used by Don in the above scenario.

Options:

A.  

File carving

B.  

Artifact wiping

C.  

Trail obfuscation

D.  

Encryption

Discussion 0
Questions 9

Wesley, a professional hacker, deleted a confidential file in a compromised system using the “/bin/rm/” command to deny access to forensic specialists.

Identify the operating system on which Don has performed the file carving act.

Options:

A.  

Windows

B.  

Android

C.  

Mac OS

D.  

Linux

Discussion 0
Questions 10

An investigator wants to extract information about the status of the network interface cards (NICs) in an organization’s Windows-based systems. Identify the command-line utility that can help the investigator detect the network status.

Options:

A.  

ipconfig

B.  

PsLoggedOn

C.  

PsList

D.  

ifconfig

Discussion 0
Questions 11

Which of the following layers of the TCP/IP model includes protocols such as Frame Relay, SMDS, Fast Ethernet, SLIP, PPP, FDDI, ATM, Ethernet, and ARP to enable a machine to deliver the desired data to other hosts in the same network?

Options:

A.  

Network access layer

B.  

Transport layer

C.  

Application layer

D.  

Internet layer

Discussion 0
Questions 12

Which of the following Tor relay nodes in the Tor circuit is designed to transfer data in an encrypted format?

Options:

A.  

Entry relay

B.  

Guard relay

C.  

Exit relay

D.  

Middle relay

Discussion 0
Questions 13

Which of the following network protocols creates secure tunneling through which content obfuscation can be achieved?

Options:

A.  

SNMP

B.  

ARP

C.  

SSH

D.  

UDP

Discussion 0
Questions 14

Cheryl, a forensic expert, was recruited to investigate a malicious activity performed by an anonymous hackers’ group on an organization’s systems. Using an automated tool, Cheryl was able to extract the malware file and analyze the assembly code instructions, which helped him understand the malware’s purpose.

Which of the following tools helped Cheryl extract and analyze the assembly code of the malware?

Options:

A.  

Virtual Box

B.  

QualNet

C.  

OllyDbg

D.  

VMware vSphere

Discussion 0
Questions 15

A forensic investigator is collecting volatile data such as system information and network information present in the registries, cache, DLLs, and RAM of digital devices through its normal interface.

Identify the data acquisition method the investigator is performing.

Options:

A.  

Static acquisition

B.  

Live acquisition

C.  

Non-volatile data acquisition

D.  

Dead acquisition

Discussion 0
Questions 16

Which of the following techniques is defined as the art of hiding data “behind” other data without the target’s knowledge, thereby hiding the existence of the message itself?

Options:

A.  

Password cracking

B.  

Artifact wiping

C.  

Steganography

D.  

Program packer

Discussion 0
Questions 17

Sarah, a forensic investigator, is working on a criminal case. She was provided with all the suspect devices. Sarah employs an imaging software tool for duplicating the original data from the suspect devices. However, the tool she employed failed to image the data as the suspect version of the drive was very old and incompatible with imaging software. Hence, Sarah used an alternative data acquisition technique and succeeded in imaging the data.

Which of the following types of data acquisition techniques did Sarah employ in the above scenario?

Options:

A.  

Sparse acquisition

B.  

Bit-stream disk-to-image-file

C.  

Logical acquisition

D.  

Bit-stream disk-to-disk

Discussion 0
Questions 18

Which of the following layers of the TCP/IP model serves as the backbone for data flow between two devices in a network and enables peer entities on the source and destination devices to communicate with each other?

Options:

A.  

Internet layer

B.  

Network access layer

C.  

Transport layer

D.  

Application layer

Discussion 0
Questions 19

Jack, a forensic investigator, was appointed to investigate a Windows-based security incident. In this process, he employed an Autopsy tool to recover the deleted files from unallocated space, which helps in gathering potential evidence.

Which of the following functions of Autopsy helped Jack recover the deleted files?

Options:

A.  

Timeline analysis

B.  

Multimedia

C.  

Web artifacts

D.  

Data carving

Discussion 0
Questions 20

Clark, a digital forensic expert, was assigned to investigate a malicious activity performed on an organization’s network. The organization provided Clark with all the information related to the incident. In this process, he assessed the impact of the incident on the organization, reasons for and source of the incident, steps required to tackle the incident, investigation team required to handle the case, investigative procedures, and possible outcome of the forensic process.

Identify the type of analysis performed by Clark in the above scenario.

Options:

A.  

Traffic analysis

B.  

Case analysis

C.  

Data analysis

D.  

Log analysis

Discussion 0
Questions 21

Steve, a professional hacker, attempted to hack Alice’s banking account. To accomplish his goal, Steve used an automated tool to guess Alice’s login credentials. The tool uses a trial-and-error method by attempting all possible combinations of usernames and passwords to determine the valid credentials.

Identify the type of attack initiated by Steve in the above scenario.

Options:

A.  

Brute-force attack

B.  

Phishing attack

C.  

Trojan horse attack

D.  

Data manipulation attack

Discussion 0
Questions 22

Which of the following commands can an investigator use to parse GPTs of both types of hard disks, including those formatted with either UEFI or MBR?

Options:

A.  

Get-BootSector

B.  

Get-PartitionTable

C.  

Get-ForensicPartitionTable

D.  

Get-GPT

Discussion 0