4_5_2 Section 5 – Operations and Incident Response - 4.5 – Digital Forensics- Forensics Data Acquisition
32 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Why is it important to prioritize collecting data from a system based on its volatility?

  • Because more volatile data may only be available for a short time (correct)
  • Because it's easier to collect data from the CPU
  • Because all data is equally important
  • Because less volatile data is more important
  • What type of data is considered the most volatile and should be collected first?

  • Information in your backups and archival media
  • Data in temporary file systems
  • Process tables and memory information
  • Data in your CPU registers or CPU cache (correct)
  • What type of data is likely to be stored on a system for an extended period of time?

  • Data in your CPU registers or CPU cache
  • Temporary file systems
  • Information in your backups and archival media (correct)
  • Router tables and ARP cache
  • What is the next step in collecting data after gathering CPU information?

    <p>Collecting information from router tables, ARP cache, process tables, and memory</p> Signup and view all the answers

    Why is it important to collect data from remote logging facilities?

    <p>Because it may be stored for an extended period of time</p> Signup and view all the answers

    What type of data rarely changes on a system?

    <p>The physical configuration of the device or the typology of the network</p> Signup and view all the answers

    What type of data might be captured over the network?

    <p>Raw data that was sent over the network</p> Signup and view all the answers

    What can be done with extensive packet captures in larger environments?

    <p>Rewind back in time and see the raw data that was transferred</p> Signup and view all the answers

    Where can smaller packet captures be found?

    <p>On security devices such as firewalls and intrusion prevention systems</p> Signup and view all the answers

    What are the bits of data stored in different places in memory or on the storage drive referred to as?

    <p>Artifacts</p> Signup and view all the answers

    What type of information might be stored in an artifact?

    <p>Information from various sources such as logs, cache files, and browser bookmarks</p> Signup and view all the answers

    Why are artifacts useful in analyzing network activity?

    <p>Because they can help fill gaps in network activity analysis</p> Signup and view all the answers

    What can be used to gather information from a mobile device?

    <p>Either a previously made backup file or a direct connection to the device over USB</p> Signup and view all the answers

    What type of information can be found on a mobile device?

    <p>Phone calls, contact information, text messages, email data, images, and more</p> Signup and view all the answers

    Why might an attacker modify the firmware of a device?

    <p>To gain access to the device and install malware</p> Signup and view all the answers

    What is a snapshot of a virtual machine?

    <p>A way to image a virtual machine</p> Signup and view all the answers

    What is the purpose of a cache?

    <p>To temporarily store data for faster access</p> Signup and view all the answers

    What type of data is typically stored in a CPU cache?

    <p>Data specific to the operation of a single CPU</p> Signup and view all the answers

    What happens to the data in a cache over time?

    <p>The data times out or is erased when the cache is full</p> Signup and view all the answers

    What can be found in a browser cache?

    <p>URLs, text, and images from visited pages</p> Signup and view all the answers

    Why is a cache used in a system?

    <p>To speed up the process of querying data</p> Signup and view all the answers

    What can be done with a snapshot of a virtual machine?

    <p>It can be used to recreate the virtual machine</p> Signup and view all the answers

    What is the primary reason for removing the storage drive from the system during forensic analysis?

    <p>To ensure nothing is written to the drive during analysis</p> Signup and view all the answers

    What type of data is preserved during a bit-for-bit copy of a storage drive?

    <p>All data, including deleted files and marked for deletion</p> Signup and view all the answers

    What is the purpose of a swap or pagefile in modern operating systems?

    <p>To free up memory for other applications</p> Signup and view all the answers

    What is the benefit of capturing information from memory during forensic analysis?

    <p>To gather information that may not be written to the storage drive</p> Signup and view all the answers

    Why is it important to gather information from the swap or pagefile during forensic analysis?

    <p>To gather information that may not be in active memory</p> Signup and view all the answers

    What is the purpose of comparing operating system files and libraries to a known-good version during forensic analysis?

    <p>To understand the security event being investigated</p> Signup and view all the answers

    What type of information can be gathered from the operating system itself during forensic analysis?

    <p>Information about logged-in users, open ports, running processes, and attached devices</p> Signup and view all the answers

    What is the benefit of using a handheld imaging device during forensic analysis?

    <p>To ensure nothing is written to the drive during analysis</p> Signup and view all the answers

    What is the purpose of a memory dump in forensic analysis?

    <p>To capture the entire contents of active memory</p> Signup and view all the answers

    Why is it important to analyze data from multiple sources during forensic analysis?

    <p>To gather a complete and accurate picture of the security event</p> Signup and view all the answers

    More Like This

    Computer System Architecture
    18 questions

    Computer System Architecture

    CharismaticLimeTree avatar
    CharismaticLimeTree
    Database System Architecture
    11 questions

    Database System Architecture

    GlamorousMinimalism avatar
    GlamorousMinimalism
    IT 302 System Integration & Architecture
    5 questions
    Use Quizgecko on...
    Browser
    Browser