Spring Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

112-57 EC-Council Digital Forensics Essentials (DFE) Questions and Answers

Questions 4

Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?

Options:

A.

MZHistoryView

B.

BrowsingHistoryView

C.

MZCacheView

D.

ChromeHistoryView

Buy Now
Questions 5

Bob, a forensic investigator, was instructed to review a Windows machine and identify any anonymous activities performed using it. In this process, Bob used the command “netstat -ano” to view all the active connections in the system and determined that the connections established by the Tor browser were closed.

Which of the following states of the connections established by Tor indicates that the Tor browser is closed?

Options:

A.

CLOSE_WAIT

B.

TIME_WAIT

C.

ESTABLISHED

D.

LISTENING

Buy Now
Questions 6

Which of the following layers of the TCP/IP model includes protocols such as Frame Relay, SMDS, Fast Ethernet, SLIP, PPP, FDDI, ATM, Ethernet, and ARP to enable a machine to deliver the desired data to other hosts in the same network?

Options:

A.

Network access layer

B.

Transport layer

C.

Application layer

D.

Internet layer

Buy Now
Questions 7

Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization’s network.

Identify the type of network attack Bob initiated on the target organization in the above scenario.

Options:

A.

Data modification

B.

Enumeration

C.

Session hijacking

D.

Buffer overflow

Buy Now
Questions 8

Which of the following techniques is defined as the art of hiding data “behind” other data without the target’s knowledge, thereby hiding the existence of the message itself?

Options:

A.

Password cracking

B.

Artifact wiping

C.

Steganography

D.

Program packer

Buy Now
Questions 9

Which of the following acts was passed by the U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations?

Options:

A.

The Electronic Communications Privacy Act

B.

General Data Protection Regulation (GDPR)

C.

Sarbanes–Oxley Act (SOX)

D.

Information Privacy Act 2014

Buy Now
Questions 10

Clark, a digital forensic expert, was assigned to investigate a malicious activity performed on an organization’s network. The organization provided Clark with all the information related to the incident. In this process, he assessed the impact of the incident on the organization, reasons for and source of the incident, steps required to tackle the incident, investigation team required to handle the case, investigative procedures, and possible outcome of the forensic process.

Identify the type of analysis performed by Clark in the above scenario.

Options:

A.

Traffic analysis

B.

Case analysis

C.

Data analysis

D.

Log analysis

Buy Now
Questions 11

Jennifer, a forensics investigation team member, was inspecting a compromised system. After gathering all the evidence related to the compromised system, she disconnected the system from the network to stop the spread of the incident to other systems.

Identify the role played by Jennifer in the forensics investigation.

Options:

A.

Incident responder

B.

Incident analyzer

C.

Evidence manager

D.

Expert witness

Buy Now
Questions 12

Steve, a professional hacker, attempted to hack Alice’s banking account. To accomplish his goal, Steve used an automated tool to guess Alice’s login credentials. The tool uses a trial-and-error method by attempting all possible combinations of usernames and passwords to determine the valid credentials.

Identify the type of attack initiated by Steve in the above scenario.

Options:

A.

Brute-force attack

B.

Phishing attack

C.

Trojan horse attack

D.

Data manipulation attack

Buy Now
Questions 13

David, a cybercriminal, targeted a community and initiated anti-social campaigns online. In this process, he used a layer of the web that allowed him to maintain anonymity during the campaign.

Which of the following layers of the web allowed David to hide his presence during the anti-social campaign?

Options:

A.

Surface Web

B.

World Wide Web

C.

Dark Web

D.

Deep Web

Buy Now
Questions 14

Michael, a forensic expert, was assigned to investigate an incident that involved unauthorized intrusion attempts. In this process, Michael identified all the open ports on a system and disabled them because these open ports can allow attackers to install malicious services and compromise the security of the system or network.

Which of the following commands assisted Michael in identifying open ports in the above scenario?

Options:

A.

netstat -i

B.

netstat -rn

C.

nmap -sT localhost

D.

ifconfig -promisc

Buy Now
Questions 15

Alice and John are close college friends. Alice frequently sends emails to John attaching her pics with friends. One day, Alice sent an email to John describing all the details related to the final year project without specifying the actual purpose. John missed the message as he frequently receives emails from her and did not arrive for a project seminar.

Which of the following email fields could Alice have used in the above scenario to highlight the importance of the email?

Options:

A.

Subject

B.

Date

C.

Cc

D.

Bcc

Buy Now
Questions 16

Bob, a network specialist in an organization, is attempting to identify malicious activities in the network. In this process, Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation.

Which of the following types of network-based evidence was collected by Bob in the above scenario?

Options:

A.

Full content data

B.

Statistical data

C.

Session data

D.

Alert data

Buy Now
Questions 17

Which of the following steps in forensic readiness planning provides a backup for future reference and assists in presenting evidence in a court of law?

Options:

A.

Creating a process for documenting the procedure

B.

Identifying the potential evidence required for an incident

C.

Determining the sources of evidence

D.

Keeping an incident response team ready to review the incident

Buy Now
Questions 18

Benoy, a security professional at an organization, extracted Apache access log entries to view critical information about all the operations performed on a web server. The Apache access log extracted by Benoy is given below:

“10.10.10.10 - Jason [17/Aug/2019:00:12:34 +0300] "GET /images/content/bg_body_1.jpg HTTP/1.0" 500 1458”

Identify the HTTP status code in the Apache access log entry above that indicates the response was successful.

Options:

A.

+0300

B.

500

C.

1.0

D.

2019

Buy Now
Questions 19

Which of the following network protocols creates secure tunneling through which content obfuscation can be achieved?

Options:

A.

SNMP

B.

ARP

C.

SSH

D.

UDP

Buy Now
Questions 20

Kelly, a professional hacker, used her laptop to perform illegal cyber activities for monetary gain on many victims. She securely locked her laptop using BitLocker software. Using this tool, she locked an entire volume using a secret key to deny access to the system.

Identify the anti-forensic technique used by Don in the above scenario.

Options:

A.

File carving

B.

Artifact wiping

C.

Trail obfuscation

D.

Encryption

Buy Now
Questions 21

A forensic investigator is collecting volatile data such as system information and network information present in the registries, cache, DLLs, and RAM of digital devices through its normal interface.

Identify the data acquisition method the investigator is performing.

Options:

A.

Static acquisition

B.

Live acquisition

C.

Non-volatile data acquisition

D.

Dead acquisition

Buy Now
Questions 22

Bob, a forensic specialist at a newly established NGO, discovered a security loophole in the NGO’s web application, which unintentionally reveals early enrolled NGO members’ biodata to attackers. Bob immediately employed a content filtering mechanism to protect all the NGO’s data sources and prevent further damage.

Identify the web application threat identified by Bob in the above scenario.

Options:

A.

Buffer overflow

B.

Information leakage

C.

Authentication hijacking

D.

Cookie poisoning

Buy Now
Exam Code: 112-57
Exam Name: EC-Council Digital Forensics Essentials (DFE)
Last Update: Mar 1, 2026
Questions: 75

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now 112-57 testing engine

PDF (Q&A)

$31.5  $104.99
buy now 112-57 pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 01 Mar 2026