Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil DEF 112-57 Questions and answers with Dumpstech

Exam 112-57 Premium Access

View all detail and faqs for the 112-57 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Harry, a security professional, was hired to identify the details of an attack that was initiated on a Windows system. In this process, Harry decided to check the logs of currently running applications and the information related to previously uninstalled or removed applications for suspicious events.

Which of the following folders in a Windows system stores information on applications run on the system?

Options:

A.

C:\Windows\Book

B.

C:\subdir

C.

C:\Windows\Prefetch

D.

C:\Windows\debug

Questions # 2:

Andrew, a system administrator, is performing a UEFI boot process. The current phase of the UEFI boot process consists of the initialization code that the system executes after powering on the EFI system. This phase also manages platform reset events and sets up the system so that it can find, validate, install, and run the PEI.

Which of the following UEFI boot phases is the process currently in?

Options:

A.

Driver execution environment phase

B.

Boot device selection phase

C.

Pre-EFI initialization phase

D.

Security phase

Questions # 3:

Which of the following standards and criteria version of SWGDE mandates that any action with the potential to alter, damage, or destroy any aspect of original evidence must be performed by qualified persons in a forensically sound manner?

Options:

A.

Standards and Criteria 1.3

B.

Standards and Criteria 1.7

C.

Standards and Criteria 1.5

D.

Standards and Criteria 1.1

Questions # 4:

Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?

Options:

A.

MZHistoryView

B.

BrowsingHistoryView

C.

MZCacheView

D.

ChromeHistoryView

Questions # 5:

Bob, a forensic investigator, was instructed to review a Windows machine and identify any anonymous activities performed using it. In this process, Bob used the command “netstat -ano” to view all the active connections in the system and determined that the connections established by the Tor browser were closed.

Which of the following states of the connections established by Tor indicates that the Tor browser is closed?

Options:

A.

CLOSE_WAIT

B.

TIME_WAIT

C.

ESTABLISHED

D.

LISTENING

Questions # 6:

Williams, a forensic specialist, was tasked with performing a static malware analysis on a suspect system in an organization. For this purpose, Williams used an automated tool to perform a string search and saved all the identified strings in a text file. After analyzing the strings, he determined all the harmful actions that were performed by malware.

Identify the tool employed by Williams in the above scenario.

Options:

A.

R-Drive Image

B.

ResourcesExtract

C.

Ezvid

D.

Snagit

Questions # 7:

A system that a cybercriminal was suspected to have used for performing an anti-social activity through the Tor browser. James reviewed the active network connections established using specific ports via Tor.

Which of the following port numbers does Tor use for establishing a connection via Tor nodes?

Options:

A.

1026/64666

B.

3024/4092

C.

31/456

D.

9150/9151

Questions # 8:

Given below is a regex signature used by security professionals for detecting an XSS attack:

/((%3C)|<)[^\n]+((%3E)|>)/i

Which of the following types of XSS attack does the above regex expression detect?

Options:

A.

HTML tags-based XSS attempt

B.

CSS attack

C.

Simple XSS attack

D.

In-line comment XSS attack

Questions # 9:

Which of the following types of phishing attacks allows an attacker to exploit instant messaging platforms by employing IM as a tool to spread spam?

Options:

A.

Whaling

B.

Pharming

C.

Spimming

D.

Spear phishing

Questions # 10:

Which of the following files belonging to the Extensible Storage Engine (ESE) stores the mail data in Microsoft Exchange Server?

Options:

A.

DataStore.edb

B.

Mail.MSMessageStore

C.

WLCalendarStore.edb

D.

Database.edb

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions