Digital Forensics Quiz

Digital Forensics Quiz

Created by
@jlopez59#

Questions and Answers

What is the best description of volatile data?

Data that is lost when the system is used, such as the swap file and state of network connections

What is digital evidence?

Information that has been processed and assembled to be relevant to an investigation

What is the purpose of a swap file on a Windows system?

To act as a 'scratch pad' for writing data when additional RAM is needed

Where would Justin find the swap file on a Windows system?

<p>In the pagefile.sys file</p> Signup and view all the answers

What type of file is a swap file?

<p>A temporary file</p> Signup and view all the answers

What is the purpose of examining the system configuration in a digital forensic investigation?

<p>To identify potential sources of digital evidence</p> Signup and view all the answers

What type of attack is likely underway when an email approving a request for funds to be moved from a corporate account to a personal account is sent from a domain not affiliated with the company?

<p>Phishing</p> Signup and view all the answers

How is cyberterrorism different from other cybercrimes?

<p>It is investigated by federal law enforcement.</p> Signup and view all the answers

What is the process of searching memory in real-time, typically for working with compromised hosts or to identify system abuse?

<p>Live system forensics</p> Signup and view all the answers

What refers to how long digital evidence is valid?

<p>Life span</p> Signup and view all the answers

What type of data changes rapidly and may be lost when a machine is powered down?

<p>Volatile data</p> Signup and view all the answers

What type of evidence is an expert witness using when they explain a technical concept to the judge and jury using a high-tech computer animation?

<p>Demonstrative evidence</p> Signup and view all the answers

According to the order of volatility in RFC 3227, what evidence should you collect first on a typical system?

<p>Volatile data, then file slack</p> Signup and view all the answers

Where are Windows passwords hashed and stored on the local machine?

<p>SAM file</p> Signup and view all the answers

What type of phishing attack targets a high-value target, such as a senior company executive?

<p>Whaling</p> Signup and view all the answers

What is the best definition of 'forensics'?

<p>The collection and analysis of digital evidence</p> Signup and view all the answers

What is the third task of a system forensics specialist in handling evidence?

<p>Analyze evidence</p> Signup and view all the answers

What should Devaki do before removing the hard drive from the suspect machine?

<p>Document the machine's current state</p> Signup and view all the answers

What is an example of volatile data?

<p>The state of network connections</p> Signup and view all the answers

What is the primary purpose of a Denial of Service (DoS) attack?

<p>To prevent legitimate users from accessing a system</p> Signup and view all the answers

What is the Digital Forensic Research Workshop (DFRWS) framework?

<p>A framework for digital forensics research</p> Signup and view all the answers

What should Joey do when investigating a remotely compromised computer that is still running?

<p>Capture the current memory, running tasks, and live connections, and then shut the computer down</p> Signup and view all the answers

What is the primary goal of criminals when committing identity theft?

<p>To perpetrate financial fraud</p> Signup and view all the answers

What is an attack vector that cannot be investigated on the victim's machine?

<p>Dumpster diving</p> Signup and view all the answers

What is the definition of chain of custody?

<p>The continuity of control of evidence from collection to court</p> Signup and view all the answers

What is the best approach for a forensic examiner with experience in Windows and Linux to take when extracting data from a Mac OS computer?

<p>Rely on experience with Windows and Linux to extract data</p> Signup and view all the answers

How can attackers leveraging SQL injection be thwarted?

<p>By disallowing the use of additional characters</p> Signup and view all the answers

What are the three specific steps to follow when handling computer evidence?

<p>Find, preserve, prepare</p> Signup and view all the answers

What is the definition of a hash?

<p>A function that is nonreversible, takes variable-length input, produces fixed-length output, and has few or no collisions</p> Signup and view all the answers

What mistake did Jiang make during the seizure of a suspect computer?

<p>He stopped to purchase supplies on the way to the lab</p> Signup and view all the answers

What is the concept that holds that you cannot interact in an environment without altering it in some way?

<p>The concept of Locard's Exchange Principle</p> Signup and view all the answers

What is the purpose of developing a plan of action as a forensic investigator?

<p>To determine which tools are most appropriate for a specific investigation</p> Signup and view all the answers

Study Notes

Digital Forensics

  • Volatile data refers to information that is lost when the system is powered down, such as the state of network connections and swap files.

Digital Evidence

  • Digital evidence is information that has been processed and assembled to support a specific finding or determination in an investigation.

Swap Files

  • Windows uses a swap file, also known as a pagefile, as a "scratch pad" to write data when additional RAM is needed.

Phishing

  • Phishing is a type of attack where an attacker sends a fake email or message to trick the victim into revealing sensitive information.
  • Phishing attacks are often motivated by financial gain.

Cyberterrorism

  • Cyberterrorism is a type of cybercrime that is investigated by federal law enforcement agencies.
  • Cyberterrorism attacks are motivated by ideological or political goals, rather than financial gain.

Live System Forensics

  • Live system forensics is the process of searching memory in real-time, typically to identify system abuse or to work with compromised hosts.

Information Lifespan

  • The lifespan of information refers to how long it remains valid and can be used as evidence.

Volatile Data

  • Volatile data changes rapidly and may be lost when the machine that holds it is powered down.
  • Examples of volatile data include the state of network connections, swap files, and running processes.

Digital Forensic Investigation

  • The order of volatility in digital forensic investigations is:
    1. Volatile data
    2. File system data
    3. System state backup
    4. The registry
    5. Internet traces
  • Forensic investigators should collect evidence in the order of volatility to preserve the most fragile data first.

Expert Witness

  • An expert witness is a specialist who provides testimony in court to explain technical concepts.
  • Expert witnesses may use high-tech computer animations to explain complex technical concepts.

Evidence Handling

  • Forensic investigators have three basic tasks related to handling evidence:
    1. Find evidence
    2. Preserve evidence
    3. Analyze evidence
  • The chain of custody is a record of the handling and storage of evidence, including who had access to it and when.

Network Forensics

  • Network forensics is the process of examining data traffic, including transaction logs and real-time monitoring using sniffers and tracing.

Rules of Evidence

  • The rules of evidence govern whether, when, how, and why proof of a legal case can be presented in court.

Forensic Research

  • The Digital Forensic Research Workshop (DFRWS) is a nonprofit organization that aims to enhance the sharing of knowledge and ideas about digital forensics research.

Identity Theft

  • Identity theft is a type of fraud where criminals steal personal data to impersonate victims.

Computer Forensics

  • Computer forensics is the process of examining digital data to gather evidence and support investigations.

Digital Forensic Analysis

  • Digital forensic analysis involves the examination of digital data to identify evidence, reconstruct events, and support investigations.
  • Digital forensic analysts should develop a plan of action that covers how to gather evidence and which tools are most appropriate for a specific investigation.

Locard's Principle

  • Locard's Principle holds that you cannot interact in an environment without altering it in some way, without leaving some trace.

Chain of Custody

  • The chain of custody is a record of the handling and storage of evidence, including who had access to it and when.
  • The chain of custody is used to establish the authenticity and integrity of evidence.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Use Quizgecko on...
Browser
Browser