Decide Fast & Get 50% Flat Discount on This Special Offer | Limited Time Offer - Ends In COUPON CODE: SAVE50%

Practice Eccouncil 112-57 Exam Questions

    1. Page: 1/15
      Total 75 Questions
    Question No 1
    Wesley, a professional hacker, deleted a confidential file in a compromised system using the “/bin/rm/” command to deny access to forensic specialists. Identify the operating system on which Don has performed the file carving act.
    Choose the Choices:


    Question No 2
    A disk drive has 16,384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data.

    What is the total size of the disk?
    Choose the Choices:


    Question No 3
    Which of the following tools helps forensic experts analyze user activity in the Microsoft Edge browser?
    Choose the Choices:


    Question No 4
    Which of the following network protocols creates secure tunneling through which content obfuscation can be achieved?
    Choose the Choices:


    Question No 5
    Below are the elements included in the order of volatility for a typical computing system as per the RFC 3227 guidelines for evidence collection and archiving. Archival media Remote logging and monitoring data related to the target system Routing table, process table, kernel statistics, and memory Registers and processor cache Physical configuration and network topology Disk or other storage media Temporary system files Identify the correct sequence of order of volatility from the most to least volatile for a typical system.
    Choose the Choices:



    1. Page: 1/15
      Total 75 Questions