🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

4_5_2 Section 5 – Operations and Incident Response - 4.5 – Digital Forensics- Forensics Data Acquisition
32 Questions
0 Views

4_5_2 Section 5 – Operations and Incident Response - 4.5 – Digital Forensics- Forensics Data Acquisition

Created by
@UnmatchedMandolin

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Why is it important to prioritize collecting data from a system based on its volatility?

  • Because more volatile data may only be available for a short time (correct)
  • Because it's easier to collect data from the CPU
  • Because all data is equally important
  • Because less volatile data is more important
  • What type of data is considered the most volatile and should be collected first?

  • Information in your backups and archival media
  • Data in temporary file systems
  • Process tables and memory information
  • Data in your CPU registers or CPU cache (correct)
  • What type of data is likely to be stored on a system for an extended period of time?

  • Data in your CPU registers or CPU cache
  • Temporary file systems
  • Information in your backups and archival media (correct)
  • Router tables and ARP cache
  • What is the next step in collecting data after gathering CPU information?

    <p>Collecting information from router tables, ARP cache, process tables, and memory</p> Signup and view all the answers

    Why is it important to collect data from remote logging facilities?

    <p>Because it may be stored for an extended period of time</p> Signup and view all the answers

    What type of data rarely changes on a system?

    <p>The physical configuration of the device or the typology of the network</p> Signup and view all the answers

    What type of data might be captured over the network?

    <p>Raw data that was sent over the network</p> Signup and view all the answers

    What can be done with extensive packet captures in larger environments?

    <p>Rewind back in time and see the raw data that was transferred</p> Signup and view all the answers

    Where can smaller packet captures be found?

    <p>On security devices such as firewalls and intrusion prevention systems</p> Signup and view all the answers

    What are the bits of data stored in different places in memory or on the storage drive referred to as?

    <p>Artifacts</p> Signup and view all the answers

    What type of information might be stored in an artifact?

    <p>Information from various sources such as logs, cache files, and browser bookmarks</p> Signup and view all the answers

    Why are artifacts useful in analyzing network activity?

    <p>Because they can help fill gaps in network activity analysis</p> Signup and view all the answers

    What can be used to gather information from a mobile device?

    <p>Either a previously made backup file or a direct connection to the device over USB</p> Signup and view all the answers

    What type of information can be found on a mobile device?

    <p>Phone calls, contact information, text messages, email data, images, and more</p> Signup and view all the answers

    Why might an attacker modify the firmware of a device?

    <p>To gain access to the device and install malware</p> Signup and view all the answers

    What is a snapshot of a virtual machine?

    <p>A way to image a virtual machine</p> Signup and view all the answers

    What is the purpose of a cache?

    <p>To temporarily store data for faster access</p> Signup and view all the answers

    What type of data is typically stored in a CPU cache?

    <p>Data specific to the operation of a single CPU</p> Signup and view all the answers

    What happens to the data in a cache over time?

    <p>The data times out or is erased when the cache is full</p> Signup and view all the answers

    What can be found in a browser cache?

    <p>URLs, text, and images from visited pages</p> Signup and view all the answers

    Why is a cache used in a system?

    <p>To speed up the process of querying data</p> Signup and view all the answers

    What can be done with a snapshot of a virtual machine?

    <p>It can be used to recreate the virtual machine</p> Signup and view all the answers

    What is the primary reason for removing the storage drive from the system during forensic analysis?

    <p>To ensure nothing is written to the drive during analysis</p> Signup and view all the answers

    What type of data is preserved during a bit-for-bit copy of a storage drive?

    <p>All data, including deleted files and marked for deletion</p> Signup and view all the answers

    What is the purpose of a swap or pagefile in modern operating systems?

    <p>To free up memory for other applications</p> Signup and view all the answers

    What is the benefit of capturing information from memory during forensic analysis?

    <p>To gather information that may not be written to the storage drive</p> Signup and view all the answers

    Why is it important to gather information from the swap or pagefile during forensic analysis?

    <p>To gather information that may not be in active memory</p> Signup and view all the answers

    What is the purpose of comparing operating system files and libraries to a known-good version during forensic analysis?

    <p>To understand the security event being investigated</p> Signup and view all the answers

    What type of information can be gathered from the operating system itself during forensic analysis?

    <p>Information about logged-in users, open ports, running processes, and attached devices</p> Signup and view all the answers

    What is the benefit of using a handheld imaging device during forensic analysis?

    <p>To ensure nothing is written to the drive during analysis</p> Signup and view all the answers

    What is the purpose of a memory dump in forensic analysis?

    <p>To capture the entire contents of active memory</p> Signup and view all the answers

    Why is it important to analyze data from multiple sources during forensic analysis?

    <p>To gather a complete and accurate picture of the security event</p> Signup and view all the answers

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser