Practice Eccouncil 112-57 Exam Questions
-
-
Page: 1/15
Total 75 Questions
Question No 1
Wesley, a professional hacker, deleted a confidential file in a compromised system using the “/bin/rm/” command to deny access to forensic specialists. Identify the operating system on which Don has performed the file carving act.
Question No 2
A disk drive has 16,384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data.
What is the total size of the disk?
Question No 3
Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?
Question No 4
Which of the following network protocols creates secure tunneling through which content obfuscation can be achieved?
Question No 5
Below are the elements included in the order of volatility for a typical computing system as per the RFC 3227 guidelines for evidence collection and archiving. Archival media Remote logging and monitoring data related to the target system Routing table, process table, kernel statistics, and memory Registers and processor cache Physical configuration and network topology Disk or other storage media Temporary system files Identify the correct sequence of order of volatility from the most to least volatile for a typical system.
-
Page: 1/15
Total 75 Questions
-
