Exam Code: 112-57
Exam Questions: 76
EC-Council Digital Forensics Essentials (DFE)
Updated: 16 Apr, 2026
Viewing Page : 1 - 8
Practicing : 1 - 5 of 76 Questions
Question 1

Below are the various steps involved in an email crime investigation.1.Acquiring the email data2.Analyzing email headers3.Examining email messages4.Recovering deleted email messages5.Seizing the computer and email accounts6.Retrieving email headersWhat is the correct sequence of steps involved in the investigation of an email crime?

Options :
Answer: A

Question 2

Bob, a forensic investigator, was instructed to review a Windows machine and identify any anonymous activities performed using it. In this process, Bob used the command "netstat -ano" to view all the active connections in the system and determined that the connections established by the Tor browser were closed. Which of the following states of the connections established by Tor indicates that the Tor browser is closed? 

Options :
Answer: B

Question 3

Which of the following files belonging to the Extensible Storage Engine (ESE) stores the mail data in Microsoft Exchange Server? 

Options :
Answer: D

Question 4

Which of the following Tor relay nodes in the Tor circuit is designed to transfer data in an encrypted format? 

Options :
Answer: D

Question 5

David, a cybercriminal, targeted a community and initiated anti-social campaigns online. In this process, he used a layer of the web that allowed him to maintain anonymity during the campaign. Which of the following layers of the web allowed David to hide his presence during the anti-social campaign? 

Options :
Answer: C

Viewing Page : 1 - 8
Practicing : 1 - 5 of 76 Questions

© Copyrights FreePDFQuestions 2026. All Rights Reserved

We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.