What is a Cyber Attack or Incident?
380 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary intention of a cyber-attack?

  • To improve computer system security
  • To facilitate data sharing
  • To gain unauthorized access to a computer system (correct)
  • To enhance user experience
  • What is the term used to describe the core principles of information security?

  • Data Security Triangle
  • Security Breach Protocol
  • CIA Triad (correct)
  • Information Protection Framework
  • Which type of cybercrime targets individuals?

  • Individual Cybercrimes (correct)
  • Cyber warfare
  • Property Cybercrimes
  • Organization Cybercrimes
  • What is an example of a computer security incident?

    <p>Theft of personal information</p> Signup and view all the answers

    What should be done with suspicious events?

    <p>View them as potential incidents until proven otherwise</p> Signup and view all the answers

    What is the main target of Organization Cybercrimes?

    <p>Organizations</p> Signup and view all the answers

    What is the most common type of cybercrime attack?

    <p>Ransomware Attack</p> Signup and view all the answers

    What is the term for unauthorized access to private computers or networks?

    <p>Hacking</p> Signup and view all the answers

    What is the goal of cyberstalking?

    <p>To control and intimidate</p> Signup and view all the answers

    What is software piracy an example of?

    <p>Illegal use or copy of paid software</p> Signup and view all the answers

    What is the primary use of the 'Dark Web'?

    <p>To buy and sell illegal goods</p> Signup and view all the answers

    What is the purpose of digital forensics?

    <p>To identify and analyze cybercrime attacks</p> Signup and view all the answers

    What is cyber extortion?

    <p>Demand for money by cybercriminals</p> Signup and view all the answers

    What is the term for the violation of intellectual-property rights?

    <p>Intellectual-property Infringements</p> Signup and view all the answers

    What is the purpose of online recruitment fraud?

    <p>To obtain financial benefits from applicants</p> Signup and view all the answers

    What is the main aspect of digital evidence in digital forensics?

    <p>It's a component of criminal activities</p> Signup and view all the answers

    What is the main goal of incident response?

    <p>To minimize the effects of an attack and contain damage</p> Signup and view all the answers

    What is DFIR in the context of cybersecurity?

    <p>The process of collecting and analyzing electronic evidence</p> Signup and view all the answers

    What type of data do analysts typically collect during an investigation?

    <p>Disk images, memory images, and application data</p> Signup and view all the answers

    Why is it important to encrypt incident response data?

    <p>To keep it safe and protected</p> Signup and view all the answers

    What is the purpose of a write blocker in incident response?

    <p>To enable data to be acquired from a hard disk without modifying the disk’s data</p> Signup and view all the answers

    What is disk imaging in the context of incident response?

    <p>The imaging of a storage medium using forensic software or hardware</p> Signup and view all the answers

    What is the purpose of a forensic examination suite in incident response?

    <p>To perform a detailed analysis of disk images and memory images</p> Signup and view all the answers

    What is the main benefit of using virtual environments in incident response?

    <p>To keep the original data safe</p> Signup and view all the answers

    What is the purpose of a boot disk in incident response?

    <p>To create a bootable environment for forensic analysis</p> Signup and view all the answers

    What is the goal of log analysis in incident response?

    <p>To identify and analyze logs from various systems and applications</p> Signup and view all the answers

    What type of data is stored in a raw image file format?

    <p>All data from the original medium</p> Signup and view all the answers

    What is the purpose of AccessData FTK Imager?

    <p>To create accurate copies of the original evidence</p> Signup and view all the answers

    What are the two leading hash functions used by FTK Imager?

    <p>MD5 and SHA-1</p> Signup and view all the answers

    What is the importance of RAM dump in digital forensics investigation?

    <p>To preserve volatile data</p> Signup and view all the answers

    What is the characteristic of RAM in digital forensics?

    <p>Volatile</p> Signup and view all the answers

    What is the purpose of a Digital Forensics Lab (DFL)?

    <p>To examine computer systems</p> Signup and view all the answers

    What are the two domains of computer forensics labs?

    <p>Active-system analysis and static media examination</p> Signup and view all the answers

    What is the benefit of analyzing RAM dumps in digital forensics?

    <p>To access dynamic and live information</p> Signup and view all the answers

    What is the significance of RAM in uncovering hidden or encrypted data?

    <p>It can reveal information about active malware</p> Signup and view all the answers

    What is the difference between active-system analysis and static media examination?

    <p>Active-system analysis deals with forensic information and static media examination focuses on removable storage media</p> Signup and view all the answers

    What is the primary purpose of gathering facts and additional information about an incident?

    <p>To establish a context for the incident</p> Signup and view all the answers

    Why is it important to know the time zone of an incident?

    <p>To ensure accurate analysis of incident data</p> Signup and view all the answers

    What is the purpose of an Incident Summary Checklist?

    <p>To provide a brief overview of the incident</p> Signup and view all the answers

    What is included in the Incident Detection Checklist?

    <p>Individual system details and primary function</p> Signup and view all the answers

    What is the purpose of preserving a copy of the malware?

    <p>To analyze its network and host indicators</p> Signup and view all the answers

    What are the criteria for digital evidence to be classified as genuine and trustworthy?

    <p>Admissible, Authentic, Complete, Reliable, and Believable</p> Signup and view all the answers

    What is the first step of analyzing digital evidence?

    <p>Determining what data needs to be analyzed</p> Signup and view all the answers

    What is the purpose of examining the condition of the computer when it was seized?

    <p>To gather evidence for the investigation</p> Signup and view all the answers

    What is included in the Network Details Checklist?

    <p>List of external malicious IP addresses and domain names</p> Signup and view all the answers

    What is the purpose of inventorying the hardware on the suspect's computer?

    <p>To identify potential sources of digital evidence</p> Signup and view all the answers

    What is the first step in handling digital evidence?

    <p>Examine the data from the root directory</p> Signup and view all the answers

    What is the purpose of anti-static shielding bags in digital forensics?

    <p>To protect electronic items from damage due to electrostatic discharge</p> Signup and view all the answers

    What is the term used to describe hiding sensitive information within an ordinary file or message?

    <p>Steganography</p> Signup and view all the answers

    What is one of the methods used to detect steganography?

    <p>Stegdetect</p> Signup and view all the answers

    What type of data do DF examiners need to extract from a computer?

    <p>A variety of data, including emails, office documents, pictures, and more</p> Signup and view all the answers

    What is the purpose of Windows Event Logs in forensic analysis?

    <p>To provide information to administrators and users</p> Signup and view all the answers

    What is one of the channels in Windows Event Logs?

    <p>Application</p> Signup and view all the answers

    Why do investigators create a digital 'image' of the victim's hard drive?

    <p>To explore and test hypotheses without worrying about changing evidence</p> Signup and view all the answers

    What type of events are captured in the Security log?

    <p>Login attempts, elevated privileges, and more</p> Signup and view all the answers

    What is one of the methods hackers use to conceal their activities?

    <p>Steganography</p> Signup and view all the answers

    What is the purpose of configuring adequate logging on Windows systems?

    <p>To support effective incident response using Incident Response tools</p> Signup and view all the answers

    What is the format in which event logs are stored?

    <p>XML</p> Signup and view all the answers

    What is the purpose of cryptographic hash values in digital forensics?

    <p>To verify the drive's authenticity</p> Signup and view all the answers

    What is the name of the forensic tool that helps investigators quickly search, identify, and prioritize potential evidence?

    <p>EnCase</p> Signup and view all the answers

    What is the main feature of EnCase that allows for customizable report templates?

    <p>Reporting</p> Signup and view all the answers

    What type of data can be extracted from mobile devices using mobile digital forensics software?

    <p>Call logs, photos, messages, browsers history, geolocation data, and more</p> Signup and view all the answers

    What is the primary goal of DF examiners when conducting mobile forensics?

    <p>To gather all passcodes, passwords, or patterns of the exhibit</p> Signup and view all the answers

    What is the purpose of the Setup log?

    <p>To capture incidents of installation or upgrading of the Windows operating system</p> Signup and view all the answers

    What is the most common method of data extraction that allows access to live and deleted data, operating system files, and areas of the device that are not normally accessible to the user?

    <p>Physical Extraction</p> Signup and view all the answers

    What is the name of the folder where event logs are stored?

    <p>System32/winevt/Logs</p> Signup and view all the answers

    What is the main benefit of using a SIEM or log aggregator?

    <p>To support effective incident response</p> Signup and view all the answers

    What type of extraction retrieves the device's file system and interprets the data during the processing stage?

    <p>File System Dump (FSD)</p> Signup and view all the answers

    What is the limitation of logical extraction?

    <p>It cannot be performed on locked or password-protected devices</p> Signup and view all the answers

    What is the method of data extraction that involves accessing the device and recording data displayed on the screen with photographs or video, or by transcribing its data?

    <p>Manual Extraction</p> Signup and view all the answers

    What is the method of data extraction that requires the stripping down of the device to its logical board and soldering a certain cable to a certain connection on the board?

    <p>JTAG Extraction</p> Signup and view all the answers

    What is the limitation of chip-off method?

    <p>It damages the device and it cannot be used anymore</p> Signup and view all the answers

    What type of data can be acquired through logical extraction?

    <p>Call and text logs, contact lists, and passwords</p> Signup and view all the answers

    What is the purpose of bootloaders in mobile devices?

    <p>To allow the insertion of a small piece of code into the RAM during start-up</p> Signup and view all the answers

    What is the advantage of physical extraction over logical extraction?

    <p>It can be performed on locked or password-protected devices</p> Signup and view all the answers

    What is the limitation of forensic software?

    <p>It does not support certain models of mobile devices</p> Signup and view all the answers

    A cyber-attack is defined as any attempt to gain unauthorized access to a computer system with the intent to cause damage.

    <p>True</p> Signup and view all the answers

    Cyber-attacks aim to only disrupt or destroy computer systems.

    <p>False</p> Signup and view all the answers

    A cyber incident refers to any event that compromises the confidentiality, integrity, or availability of data or information.

    <p>True</p> Signup and view all the answers

    Individual Cybercrimes target organizations.

    <p>False</p> Signup and view all the answers

    Property Cybercrimes target individuals' personal information.

    <p>False</p> Signup and view all the answers

    Suspicious events should be ignored until proven otherwise.

    <p>False</p> Signup and view all the answers

    FTK Imager is a closed-source software used for creating accurate copies of the original evidence.

    <p>False</p> Signup and view all the answers

    Raw image file formats store only a part of the data from the original medium.

    <p>False</p> Signup and view all the answers

    FTK Imager can create forensic images of only local hard drives and floppy disks.

    <p>False</p> Signup and view all the answers

    Incident response is a disorganized approach to identify an attack, minimize its effects, and remediate the cause.

    <p>False</p> Signup and view all the answers

    RAM dump is a process of capturing the contents of a computer's storage device.

    <p>False</p> Signup and view all the answers

    DFIR specialists gather and inspect information to determine who attacked them, how they got in, and what tools were used to compromise their systems.

    <p>True</p> Signup and view all the answers

    RAM is a non-volatile form of memory that holds data permanently.

    <p>False</p> Signup and view all the answers

    Organizations do not need to provide proper training and create documentation for their IR process.

    <p>False</p> Signup and view all the answers

    Hash reports are used to compare the integrity of the original evidence with the copied evidence.

    <p>True</p> Signup and view all the answers

    Disk images are a bit-for-bit copy of a digital storage device, usually of a hard drive or hard disk.

    <p>True</p> Signup and view all the answers

    Digital Forensics Lab (DFL) is used for storing digital evidence.

    <p>False</p> Signup and view all the answers

    Memory images contain a wealth of information often available on the hard drive.

    <p>False</p> Signup and view all the answers

    Active-system analysis deals with forensic information stored in non-volatile memory.

    <p>False</p> Signup and view all the answers

    The most effective way to protect IR data is to encrypt it.

    <p>True</p> Signup and view all the answers

    FTK Imager can create forensic images in only one format.

    <p>False</p> Signup and view all the answers

    Write blockers allow write commands to be executed on the hard disk during the imaging process.

    <p>False</p> Signup and view all the answers

    RAM dump is not essential for digital forensics investigation because it does not hold any valuable information.

    <p>False</p> Signup and view all the answers

    IR teams use commercial software only for their investigation.

    <p>False</p> Signup and view all the answers

    Disk imaging can be performed using hardware only.

    <p>False</p> Signup and view all the answers

    Hash verification is not an important feature of imaging software.

    <p>False</p> Signup and view all the answers

    Phishing is a type of cybercrime that targets users and trick them by sending fake messages and emails to get sensitive information.

    <p>True</p> Signup and view all the answers

    Ransomware Attack is a type of cybercrime that prevents users from accessing their personal data on the system by decrypting them.

    <p>False</p> Signup and view all the answers

    Identity Theft is a type of cybercrime that occurs when a cybercriminal uses their own personal data to commit a fraud or a crime.

    <p>False</p> Signup and view all the answers

    Cyber Bullying is also known as offline or internet bullying.

    <p>False</p> Signup and view all the answers

    Software Piracy is the legal use or copy of paid software with violation of copyrights or license restrictions.

    <p>False</p> Signup and view all the answers

    Digital forensic is a branch of science that focuses on identifying, acquiring, processing, analyzing, and reporting on data stored electronically.

    <p>True</p> Signup and view all the answers

    Cyber Extortion is the demand for money by cybercriminals to give back some unimportant data they've stolen.

    <p>False</p> Signup and view all the answers

    Online Recruitment Fraud is a type of cybercrime that releases fake job opportunities for the purpose of obtaining a financial benefit from applicants or even making use of their personal data.

    <p>True</p> Signup and view all the answers

    Internet Fraud is a type of cybercrime that makes use of the telephone, and it can be considered a general term that groups all the crimes that happen over the telephone.

    <p>False</p> Signup and view all the answers

    Digital evidence is a component of criminal activities and digital forensics that is not crucial for law enforcement investigations.

    <p>False</p> Signup and view all the answers

    An IP address is more helpful if you know the time zone it belongs to.

    <p>False</p> Signup and view all the answers

    It is not necessary to gather facts and additional information about the incident.

    <p>False</p> Signup and view all the answers

    The Incident Detection Checklist includes individual system details.

    <p>True</p> Signup and view all the answers

    A copy of the malware should not be preserved during the investigation.

    <p>False</p> Signup and view all the answers

    The Incident Summary Checklist includes the type of affected resources.

    <p>True</p> Signup and view all the answers

    Network monitoring is not necessary during the investigation.

    <p>False</p> Signup and view all the answers

    The primary function of the system is not important during the investigation.

    <p>False</p> Signup and view all the answers

    The time zone of the incident is not important during the investigation.

    <p>False</p> Signup and view all the answers

    The Malware Details Checklist includes the list of systems where the malware was found.

    <p>True</p> Signup and view all the answers

    The Incident Summary Checklist includes the contact information of the person who detected the incident.

    <p>True</p> Signup and view all the answers

    Digital evidence should be stored in an unsecured location to allow for easy access.

    <p>False</p> Signup and view all the answers

    Steganography is a technique used to detect hidden information in files.

    <p>False</p> Signup and view all the answers

    Windows Event Logs are structured in three channels.

    <p>False</p> Signup and view all the answers

    DF examiners need to extract only emails and office documents from a computer.

    <p>False</p> Signup and view all the answers

    Anti-static shielding bags are used to destroy electronic evidence.

    <p>False</p> Signup and view all the answers

    Investigators should leave digital evidence unattended during an investigation.

    <p>False</p> Signup and view all the answers

    The primary purpose of digital forensics is to delete data from a computer.

    <p>False</p> Signup and view all the answers

    Cryptographic hash values are used to tamper with digital evidence.

    <p>False</p> Signup and view all the answers

    Stegdetect is a tool used to create steganography.

    <p>False</p> Signup and view all the answers

    Digital evidence should be labeled and sealed with a generic container.

    <p>False</p> Signup and view all the answers

    Windows Security Event logs contain information about login attempts, elevated privileges, and more.

    <p>True</p> Signup and view all the answers

    Error, audit success and failure logs are not important in terms of forensic investigations.

    <p>False</p> Signup and view all the answers

    Logical extraction involves retrieving raw binary data from the media storage of the device.

    <p>False</p> Signup and view all the answers

    SIEM or log aggregator is not necessary for effective incident response.

    <p>False</p> Signup and view all the answers

    A physical extraction can retrieve deleted data, operating system files, and areas of the device that are not normally accessible to the user.

    <p>True</p> Signup and view all the answers

    Event logs are stored in TXT format at System32/winevt/Logs folder.

    <p>False</p> Signup and view all the answers

    Deleted files can be recovered through logical extraction.

    <p>False</p> Signup and view all the answers

    JTAG and Chip-Off methods can be used to extract data from damaged or locked mobile devices.

    <p>True</p> Signup and view all the answers

    EnCase Forensic helps investigators quickly search, identify, and prioritize potential evidence across computers, laptops, and mobile devices.

    <p>True</p> Signup and view all the answers

    Manual extraction involves accessing the device and recording data displayed on the screen with photographs or video.

    <p>True</p> Signup and view all the answers

    DF examiners do not need to extract all passcodes, passwords, or patterns of the exhibit before conducting the work.

    <p>False</p> Signup and view all the answers

    Mobile digital forensics software can extract data from call logs, photos, and browsers history.

    <p>True</p> Signup and view all the answers

    File System Dump (FSD) retrieves raw binary data from the media storage of the device.

    <p>False</p> Signup and view all the answers

    Almost all extraction methods do not require phones to be unlocked.

    <p>False</p> Signup and view all the answers

    Bootloaders are used to bypass system locks and passcodes for many devices.

    <p>True</p> Signup and view all the answers

    Windows Event Forwarding is enabled by default on all Windows systems.

    <p>False</p> Signup and view all the answers

    Chip-Off method does not damage the device.

    <p>False</p> Signup and view all the answers

    Windows Event logs are categorized into four levels: information, warning, error, and critical.

    <p>False</p> Signup and view all the answers

    Devices operating on Android version 7.0 onwards are encrypted by default.

    <p>True</p> Signup and view all the answers

    Physical extraction can be performed on locked or password-protected devices.

    <p>True</p> Signup and view all the answers

    A cyber-attack aims to only disable or disrupt computer systems.

    <p>False</p> Signup and view all the answers

    Suspicious events should be viewed as potential incidents until proven otherwise.

    <p>True</p> Signup and view all the answers

    Property Cybercrimes target individuals.

    <p>False</p> Signup and view all the answers

    Cyber-attacks aim to alter, block, delete, manipulate, or steal the data held within computer systems.

    <p>True</p> Signup and view all the answers

    Individual Cybercrimes target only organizations.

    <p>False</p> Signup and view all the answers

    A cyber incident refers to any event that compromises the confidentiality, integrity, or availability of data or information.

    <p>True</p> Signup and view all the answers

    Phishing is a type of social engineering attack that targets systems and trick them by sending fake messages and emails to get sensitive information.

    <p>False</p> Signup and view all the answers

    Identity theft occurs when a cybercriminal uses another person's personal data with their permission to commit a fraud or a crime.

    <p>False</p> Signup and view all the answers

    Ransomware Attack is a type of cybercrime that makes use of the internet.

    <p>False</p> Signup and view all the answers

    Cyber bullying is a type of cybercrime that targets systems.

    <p>False</p> Signup and view all the answers

    Software piracy is the legal use or copy of paid software with violation of copyrights or license restrictions.

    <p>False</p> Signup and view all the answers

    Digital forensics is a branch of science that focuses on identifying, acquiring, processing, analyzing, and reporting on data stored electronically.

    <p>True</p> Signup and view all the answers

    Cyber extortion is the demand for money by cybercriminals to give back some important data they've stolen or stop doing malicious activities.

    <p>True</p> Signup and view all the answers

    Online drug trafficking is a type of cybercrime that is not commonly sold and traded online.

    <p>False</p> Signup and view all the answers

    Intellectual-property Infringements is the violation or breach of any protected intellectual-property rights such as copyrights and industrial design.

    <p>True</p> Signup and view all the answers

    Cybercrime includes cyber-terrorism.

    <p>True</p> Signup and view all the answers

    Incident response is a coordinated and structured approach to respond to incidents.

    <p>True</p> Signup and view all the answers

    DFIR specialists do not gather and inspect information to determine how to close security gaps.

    <p>False</p> Signup and view all the answers

    Memory images contain a wealth of information often available on the hard drive.

    <p>False</p> Signup and view all the answers

    Write blockers are devices that allow both read and write commands to be executed on the hard disk.

    <p>False</p> Signup and view all the answers

    IR teams use only commercial software for their investigation.

    <p>False</p> Signup and view all the answers

    Disk imaging can be performed using only hardware solutions.

    <p>False</p> Signup and view all the answers

    The primary goal of incident response is to identify an attack and ignore its effects.

    <p>False</p> Signup and view all the answers

    Organizations are not required to provide proper training and create documentation for their IR process.

    <p>False</p> Signup and view all the answers

    Encrypting incident response data is not necessary.

    <p>False</p> Signup and view all the answers

    IR teams can interface properly with specialized forensics tools using any type of laptop.

    <p>False</p> Signup and view all the answers

    Gathering facts and additional information about the incident is not necessary to establish a context.

    <p>False</p> Signup and view all the answers

    The IP address of the system is not important during the investigation.

    <p>False</p> Signup and view all the answers

    The incident summary checklist includes the date and time the incident was reported and the nature of the incident.

    <p>True</p> Signup and view all the answers

    The system's make and model is not important during the investigation.

    <p>False</p> Signup and view all the answers

    Network monitoring is not necessary during the investigation.

    <p>False</p> Signup and view all the answers

    The primary function of the system is important during the investigation.

    <p>True</p> Signup and view all the answers

    The malware details checklist includes the date and time of the detection and the name of the malicious file.

    <p>True</p> Signup and view all the answers

    The incident detection checklist includes individual system details and network details.

    <p>True</p> Signup and view all the answers

    Digital evidence is not classified as genuine and trustworthy if it meets certain criteria.

    <p>False</p> Signup and view all the answers

    The basic steps for computer forensics include inspecting the computer viruses and inventorying the hardware on the suspect's computer.

    <p>True</p> Signup and view all the answers

    FTK Imager is an open-source software used for creating disk images.

    <p>True</p> Signup and view all the answers

    RAW is not a format used for storing data in a raw file.

    <p>False</p> Signup and view all the answers

    RAM dump is not a vital step in preserving volatile data for forensic examination.

    <p>False</p> Signup and view all the answers

    FTK Imager cannot create forensic images in E01 format.

    <p>False</p> Signup and view all the answers

    Digital Forensics Lab (DFL) is not a tightly controlled area for various levels of computer examination.

    <p>False</p> Signup and view all the answers

    Active-system analysis deals with static media examination.

    <p>False</p> Signup and view all the answers

    Error-Checks is not a feature found in Expert Witness Format (EWF).

    <p>False</p> Signup and view all the answers

    FTK Imager uses only Secure Hash Algorithm (SHA-1) for generating hash reports.

    <p>False</p> Signup and view all the answers

    FTK Imager can only create forensic images of local hard drives.

    <p>False</p> Signup and view all the answers

    RAM is a non-volatile form of memory that holds data permanently.

    <p>False</p> Signup and view all the answers

    Steganography involves encrypting sensitive information within an ordinary file or message.

    <p>False</p> Signup and view all the answers

    Investigators should ensure physical security of the digital evidence to prevent it from being lost or compromised.

    <p>True</p> Signup and view all the answers

    Digital evidence can be stored in a secure location and accessed later.

    <p>True</p> Signup and view all the answers

    Anti-static shielding bags are used to destroy electronic evidence.

    <p>False</p> Signup and view all the answers

    The imaging process generates cryptographic hash values to verify the drive's authenticity.

    <p>True</p> Signup and view all the answers

    Emails are not typically extracted during digital forensic analysis.

    <p>False</p> Signup and view all the answers

    Windows Event Logs are structured in four channels: Application, System, Security, and Setup.

    <p>False</p> Signup and view all the answers

    Steganography can be used to hide text, video, images, or audio data.

    <p>True</p> Signup and view all the answers

    The primary purpose of the Windows Event Logs is to provide information to administrators and users.

    <p>True</p> Signup and view all the answers

    Digital forensic examiners typically begin by creating a physical copy of the victim's hard drive.

    <p>False</p> Signup and view all the answers

    Windows Event Logs are structured in five categories/levels.

    <p>True</p> Signup and view all the answers

    EnCase Forensic is a tool used to analyze evidence from computers and mobile devices.

    <p>True</p> Signup and view all the answers

    Security logs contain login attempts, elevated privileges, and more.

    <p>True</p> Signup and view all the answers

    Event logs are stored in CSV format at System32/winevt/Logs folder.

    <p>False</p> Signup and view all the answers

    Configuring adequate logging on Windows systems is a critical step towards effective incident response.

    <p>True</p> Signup and view all the answers

    Mobile digital forensics software can only extract data from call logs and photos.

    <p>False</p> Signup and view all the answers

    DF examiners do not need to extract all passcodes, passwords, or patterns of the exhibit prior to conducting the work.

    <p>False</p> Signup and view all the answers

    The primary goal of DF examiners is to delete data from a computer.

    <p>False</p> Signup and view all the answers

    Incident response is a disorganized approach to identify an attack, minimize its effects, and remediate the cause.

    <p>False</p> Signup and view all the answers

    Windows Event Forwarding is enabled by default on all Windows systems.

    <p>False</p> Signup and view all the answers

    Logical extraction can recover deleted files.

    <p>False</p> Signup and view all the answers

    Physical extraction retrieves the device's file system and interprets the data during the processing stage.

    <p>False</p> Signup and view all the answers

    JTAG extraction is used to extract data from damaged or locked mobile devices.

    <p>True</p> Signup and view all the answers

    Manual extraction involves accessing the device and recording data displayed on the screen with photographs or video.

    <p>True</p> Signup and view all the answers

    Chip-Off extraction does not damage the device.

    <p>False</p> Signup and view all the answers

    File System Dump (FSD) is a type of physical extraction.

    <p>False</p> Signup and view all the answers

    Bootloaders are used to bypass system locks and passcodes for many devices.

    <p>True</p> Signup and view all the answers

    _logical extraction can be performed on locked or password-protected devices.

    <p>False</p> Signup and view all the answers

    A physical extraction can retrieve only live data.

    <p>False</p> Signup and view all the answers

    Manual extraction is used when forensic software does not support the model of certain unique mobile devices.

    <p>True</p> Signup and view all the answers

    A cyber-attack is defined as any attempt to gain unauthorized access to a computer, computing system or computer ______ with the intent to cause damage.

    <p>network</p> Signup and view all the answers

    Cyber-attacks aim to disable, disrupt, destroy, or control computer systems or “device”, or to alter, block, delete, manipulate, or steal the data held within these ______.

    <p>systems</p> Signup and view all the answers

    A cyber incident refers to any event that compromises the confidentiality, integrity, or availability of data or ______ – core principles of information security.

    <p>information</p> Signup and view all the answers

    Common examples of computer security incidents are: - Data theft such as personal ______, email, and documents.

    <p>information</p> Signup and view all the answers

    Cyber-attacks aim to disable, disrupt, destroy, or control computer systems or “device”, or to alter, block, delete, manipulate, or steal the data held within these systems, in another word, a cyber incident refers to any event that compromises the ______, integrity, or availability of data or information – core principles of information security.

    <p>confidentiality</p> Signup and view all the answers

    The main categories of cybercrimes are: 1.Individual Cybercrimes, 2.Organization Cybercrimes, 3.______ Cybercrimes, and 4.

    <p>Property</p> Signup and view all the answers

    Incident response (IR) is a _____________ approach to go from incident detection to resolution.

    <p>coordinated and structured</p> Signup and view all the answers

    DFIR is a term used to refer to the process of collecting, preserving, and analyzing _____________ evidence in cyber security incidents.

    <p>electronic</p> Signup and view all the answers

    Disk images may also be taken from other storage mediums, such as _____________ drives.

    <p>USB</p> Signup and view all the answers

    The most effective way to keep information about the case safe and protected is to _____________ the data.

    <p>encrypt</p> Signup and view all the answers

    A write blocker is a device that enables data to be acquired from a hard disk without modifying the disk's _____________.

    <p>data</p> Signup and view all the answers

    The imaging software can include features such as recognition of hidden _____________.

    <p>areas</p> Signup and view all the answers

    IR teams use virtual environments to make the analysis on the working _____________.

    <p>copies</p> Signup and view all the answers

    Boot Disks Operating Systems (OS) are used as _____________ tools in IR investigation.

    <p>software</p> Signup and view all the answers

    The imaging of a storage medium can be performed using forensic _____________ or hardware.

    <p>software</p> Signup and view all the answers

    Incident response is the effort to quickly identify an attack, minimize its effects, contain _____________, and remediate the cause.

    <p>damage</p> Signup and view all the answers

    Phishing is a type of ______ engineering attack that targets users and trick them by sending fake messages and emails to get sensitive information.

    <p>social</p> Signup and view all the answers

    Identity theft occurs when a cybercriminal uses another person's ______ data like credit card numbers or personal pictures without their permission to commit a fraud or a crime.

    <p>personal</p> Signup and view all the answers

    Ransomware attack is a type of cybercrime that targets users and trick them by sending fake messages and emails to get ______ information.

    <p>sensitive</p> Signup and view all the answers

    Cyber bullying is a type of cybercrime that makes use of the internet, and it can be considered a general term that groups all the ______ that happen over the internet.

    <p>crimes</p> Signup and view all the answers

    Cyberstalking can be defined as unwanted ______ content from someone targeting other individuals online with the aim of controlling and intimidating.

    <p>persistent</p> Signup and view all the answers

    Software piracy is the illegal use or copy of ______ software with violation of copyrights or license restrictions.

    <p>paid</p> Signup and view all the answers

    Social media frauds are the use of social media ______ accounts to perform any kind of harmful activities.

    <p>fake</p> Signup and view all the answers

    Online drug trafficking is the illegal sale and trade of ______ drugs over the internet.

    <p>illegal</p> Signup and view all the answers

    Electronic money laundering is based on unknown companies or online business that makes ______ payment methods and credit card transactions.

    <p>approvable</p> Signup and view all the answers

    Cyber extremism is the demand for money by cybercriminals to give back some important data they've stolen or stop doing ______ activities.

    <p>malicious</p> Signup and view all the answers

    Image file formats include raw or ______.

    <p>dd</p> Signup and view all the answers

    Expert Witness Format (EWF) and Advanced Forensic Format (AFF) are ______ formats.

    <p>image</p> Signup and view all the answers

    FTK Imager is a ______ software that is used for creating accurate copies of the original evidence.

    <p>open-source</p> Signup and view all the answers

    FTK Imager can create forensic images of local hard drives, floppy disks, Zip disks, CDs, and ______.

    <p>DVDs</p> Signup and view all the answers

    HASH REPORTS in FTK Imager generate hash reports for regular files and disk images using ______ hash functions.

    <p>two leading</p> Signup and view all the answers

    RAM dump is the process of capturing the contents of a computer's ______.

    <p>memory</p> Signup and view all the answers

    RAM is a ______ form of memory that holds data temporarily while a computer is powered on.

    <p>volatile</p> Signup and view all the answers

    Digital Forensics Lab (DFL) is divided into two domains: active-system analysis and ______ media examination.

    <p>static</p> Signup and view all the answers

    Static media examinations focus on removable flash drives, external and internal hard disks, and other types of ______ media.

    <p>storage</p> Signup and view all the answers

    DF examiners usually divide computer forensics labs into two domains: active-system analysis and ______ media examination.

    <p>static</p> Signup and view all the answers

    Without ______ it is easy to jump to wrong conclusions.

    <p>context</p> Signup and view all the answers

    The date and the time the incident was ______ is important information.

    <p>reported</p> Signup and view all the answers

    Investigators should ensure the physical security of the digital evidence so it doesn't get ____________ or compromised.

    <p>lost</p> Signup and view all the answers

    To handle digital evidence, it must be uniquely ____________ and sealed with a proper container.

    <p>labeled</p> Signup and view all the answers

    Security logs contain incidents related to ______ events according to the auditing policy of the Windows operating system.

    <p>security</p> Signup and view all the answers

    A list of malwares detected, from the time of your investigation back to the ______.

    <p>beginning</p> Signup and view all the answers

    Anti-static shielding bags are used to store, transport, and protect evidence from ____________ damage.

    <p>electrostatic</p> Signup and view all the answers

    The critical information stored on the ______ is important to know.

    <p>system</p> Signup and view all the answers

    Setup log captures incidents of ______ or upgrading of the Windows operating system.

    <p>installation</p> Signup and view all the answers

    System log contains ______ generated by the Windows operating system.

    <p>messages</p> Signup and view all the answers

    Whether the incident is currently ______ is important to know.

    <p>ongoing</p> Signup and view all the answers

    The imaging process generates ____________ hash values to verify the drive's authenticity.

    <p>cryptographic</p> Signup and view all the answers

    Steganography involves hiding sensitive information within an ordinary, non-secret file or ____________.

    <p>message</p> Signup and view all the answers

    The primary function of the ______ is important to know.

    <p>system</p> Signup and view all the answers

    Event logs are stored in ______ format at System32/winevt/Logs folder.

    <p>XML</p> Signup and view all the answers

    Hackers can use steganography to hide data files or malware in otherwise ____________ documents.

    <p>innocent</p> Signup and view all the answers

    EnCase Forensic helps investigators quickly search, identify, and prioritize potential ______ across computers, laptops, and mobile devices.

    <p>evidence</p> Signup and view all the answers

    The type of affected ______ is important to know.

    <p>resources</p> Signup and view all the answers

    New Supported Files in EnCase Forensic include.EXT4, HSFX, Microsoft Office ______ and iOS Physical Images.

    <p>2010</p> Signup and view all the answers

    Digital Forensic examiners need to extract ____________ from a computer, including emails and office documents.

    <p>data</p> Signup and view all the answers

    The incident detection checklist includes individual ______ details.

    <p>system</p> Signup and view all the answers

    Windows Event Logs are structured in five ____________ (information, warning, error, critical, and success/failure audit).

    <p>levels</p> Signup and view all the answers

    The primary function of the ______ log is to capture incidents of installation or upgrading of the Windows operating system.

    <p>Setup</p> Signup and view all the answers

    The first step of analyzing the evidence is to determine what ______ needs to be analyzed.

    <p>data</p> Signup and view all the answers

    Windows Event Logs are structured in five ____________ (Application, etc.).

    <p>channels</p> Signup and view all the answers

    DF examiners try their best to extract ______ for the case.

    <p>evidence</p> Signup and view all the answers

    Digital evidence to be classified as genuine and trustworthy should meet the following criteria: ______ in court.

    <p>Admissible</p> Signup and view all the answers

    Almost all extraction methods require phones to be ______.

    <p>unlocked</p> Signup and view all the answers

    The primary purpose of digital forensics is to analyze digital evidence and provide useful information to ____________ and users.

    <p>administrators</p> Signup and view all the answers

    The aim of DF examiners is to gather all ______, passwords or patterns of the exhibit, prior to conducting the work.

    <p>passcodes</p> Signup and view all the answers

    The File System Dump (FSD) is a hybrid of _____________ Extraction and Logical Extraction.

    <p>Physical</p> Signup and view all the answers

    The ______ method accesses the device and records of the data displayed on the screen with photographs or video.

    <p>Manual</p> Signup and view all the answers

    A physical extraction can retrieve deleted data, operating system files, and areas of the device that are not normally accessible to the ______.

    <p>user</p> Signup and view all the answers

    The JTAG and Chip-Off methods can be used to extract the data from mobile devices that are ______ or locked with a password.

    <p>damaged</p> Signup and view all the answers

    The primary goal of the DF Examiner is to retrieve information from the _____________ device.

    <p>mobile</p> Signup and view all the answers

    Logical extraction involves receiving information from the mobile device and allowing the device to present the data for ______.

    <p>analysis</p> Signup and view all the answers

    After the information has been extracted from the device, the SIM card and Micro SD are analyzed ______.

    <p>separately</p> Signup and view all the answers

    Live data which can be acquired through logical extraction include call and text logs, contact lists, and ______ to active social media.

    <p>passwords</p> Signup and view all the answers

    The ______ method typically allows the DF examiner to access live and deleted data, operating system files and areas of the device that are not normally accessible to the user.

    <p>Physical</p> Signup and view all the answers

    Devices operating on Android version 7.0 onwards are ______ by default.

    <p>encrypted</p> Signup and view all the answers

    Match the following cybercrime categories with their descriptions:

    <h1>Individual Cybercrimes = Targeting individuals, including phishing, spoofing, spam, and cyberstalking. Organization Cybercrimes = Targeting organizations, including malware attacks and denial of service attacks. Property Cybercrimes = Targeting property, including credit cards and intellectual property rights.</h1> Signup and view all the answers

    Match the following concepts with their definitions in cyber security:

    <p>CIA triad = Core principles of information security, including confidentiality, integrity, and availability. Incident = Any event that compromises the confidentiality, integrity, or availability of data or information. Cyber-attack = Any attempt to gain unauthorized access to a computer or network. Malware = Software designed to harm or exploit a computer system.</p> Signup and view all the answers

    Match the following types of cybercrimes with their targets:

    <p>Phishing = Users, to trick them into revealing sensitive information. Organization Cybercrimes = Organizations, to disrupt their operations. Property Cybercrimes = Property, such as credit cards or intellectual property. Cyberstalking = Individuals, to harass or intimidate them online.</p> Signup and view all the answers

    Match the following concepts with their descriptions in cyber security:

    <p>Data theft = Theft of personal information, email, or documents. Unauthorized access = Unauthorized access to computer resources or systems. Malware = Presence of remote access tools or spyware. Suspicious events = Events that should be viewed as potential incidents until proven otherwise.</p> Signup and view all the answers

    Match the following cybercrime categories with their examples:

    <h1>Individual Cybercrimes = Phishing, spoofing, spam, and cyberstalking. Organization Cybercrimes = Malware attacks and denial of service attacks. Property Cybercrimes = Theft of funds, credit cards, or intellectual property.</h1> Signup and view all the answers

    Match the following concepts with their descriptions in cyber security:

    <p>Incident response = A organized approach to identify an attack, minimize its effects, and remediate the cause. Cyber-attack = An attempt to disable, disrupt, destroy, or control computer systems. Data theft = Theft of personal information, email, or documents. Cyber incident = An event that compromises the confidentiality, integrity, or availability of data or information.</p> Signup and view all the answers

    Match the following types of cybercrime with their descriptions:

    <p>Phishing and Scam = Tricking users to get sensitive information or downloading malware Identity Theft = Using another person's personal data to commit fraud or a crime Ransomware Attack = Encrypting personal data and asking for a ransom to access it Hacking/Misusing Computer Networks = Unauthorized access to private computers or networks</p> Signup and view all the answers

    Match the following incident response concepts with their definitions:

    <p>Incident Response (IR) = Coordinated and structured approach to go from incident detection to resolution DFIR = Process of collecting, preserving, and analyzing electronic evidence in cyber security incidents Disk imaging = Imaging of a storage medium using forensic software or hardware Write blocker = Device that enables data to be acquired from a hard disk without modifying the disk’s data</p> Signup and view all the answers

    Match the following types of cybercrime with their descriptions:

    <p>Cyber Bullying = Sending or sharing harmful content to embarrass someone Cyber Stalking = Unwanted persistent content to control and intimidate others Software Piracy = Illegal use or copy of paid software with violation of copyrights Social Media Frauds = Using fake social media accounts to perform harmful activities</p> Signup and view all the answers

    Match the following types of cybercrime with their descriptions:

    <p>Online Drug Trafficking = Selling and trading illegal drugs online Electronic Money Laundering = Making approvable payment methods with incomplete payment information Cyber Extortion = Demanding money to give back stolen data or stop malicious activities Intellectual-property Infringements = Violating protected intellectual-property rights</p> Signup and view all the answers

    Match the following digital forensics data with their descriptions:

    <p>Disk images = Bit-for-bit copy of a digital storage device, usually of a hard drive or hard disk Memory images = Computer’s RAM, which can be recorded by special software Application data = Host logs, network device logs, and software-specific logs</p> Signup and view all the answers

    Match the following types of digital forensics with their descriptions:

    <p>Cloud Forensics = Focusing on data stored electronically in the cloud Computer Forensics = Focusing on data stored electronically in computers Mobile Forensics = Focusing on data stored electronically in mobile devices Network Forensics = Focusing on data stored electronically in networks</p> Signup and view all the answers

    Match the following hardware tools with their uses in IR investigation:

    <p>Forensics in the Field = Laptop to perform forensic work and interface with specialized tools Disk duplication and imaging systems = Create copies of the data and keep original data safe Write blockers = Acquire data from a hard disk without modifying the disk’s data Digital cameras = Document the evidence</p> Signup and view all the answers

    Match the following software tools with their uses in IR investigation:

    <p>Boot Disks = Operating Systems (OS) for disk imaging Disk Imaging Tools = Imaging of a storage medium using forensic software or hardware Memory Capture and Analysis = Capture and analyze computer’s RAM Log Analysis Tools = Analyze logs from various devices and systems</p> Signup and view all the answers

    Match the following cybercrime with its primary usage:

    <p>Phishing and Scam = Social engineering attack Ransomware Attack = The most common type of attack Hacking/Misusing Computer Networks = Unauthorized access to private computers or networks Society Cybercrimes = Cyber-terrorism</p> Signup and view all the answers

    Match the following concepts with their importance in IR investigation:

    <p>Encryption = Keep information about the case safe and protected Hash verification = Verify the integrity of the data during the imaging process Time zone = Important to consider during the investigation System function = Important to know during the investigation</p> Signup and view all the answers

    Match the following types of cybercrime with their descriptions:

    <p>Online Recruitment Fraud = Fake job opportunities to obtain financial benefit or personal data Cyber Extortion = Demanding money to give back stolen data or stop malicious activities Intellectual-property Infringements = Violating protected intellectual-property rights Electronic Money Laundering = Making approvable payment methods with incomplete payment information</p> Signup and view all the answers

    Match the following digital forensic terms with their descriptions:

    <p>Digital Forensics = Identifying, acquiring, processing, analyzing, and reporting on electronic data Digital Evidence = A component of criminal activities and digital forensics Cloud Forensics = Focusing on data stored electronically in the cloud Cybercrime = A type of crime that involves computers or networks</p> Signup and view all the answers

    Match the following resources with their uses in IR investigation:

    <p>Virtual environments = Make analysis on the working copies of the data Shared forensics equipment = Various tools for data acquisition and analysis Case-Opening Tools = Open and analyze the case Hard drives for evidence storage = Store evidence data</p> Signup and view all the answers

    Match the following types of cybercrime with their descriptions:

    <p>Social Media Frauds = Using fake social media accounts to perform harmful activities Online Drug Trafficking = Selling and trading illegal drugs online Cyber Bullying = Sending or sharing harmful content to embarrass someone Cyber Stalking = Unwanted persistent content to control and intimidate others</p> Signup and view all the answers

    Match the following concepts with their descriptions in IR investigation:

    <p>Cyber security incidents = Attacks, unauthorized access, or other security breaches Incident resolution = Effort to quickly identify an attack, minimize its effects, and remediate the cause IR team = Team or department responsible for carrying out incident response practices DFIR specialists = Specialists who gather and inspect information to determine the cause of an incident</p> Signup and view all the answers

    Match the following types of cybercrime with their descriptions:

    <p>Software Piracy = Illegal use or copy of paid software with violation of copyrights Intellectual-property Infringements = Violating protected intellectual-property rights Cyber Extortion = Demanding money to give back stolen data or stop malicious activities Ransomware Attack = Encrypting personal data and asking for a ransom to access it</p> Signup and view all the answers

    Match the following data with their uses in IR investigation:

    <p>User logs = Information about user activity Web server access logs = Information about web server access Firewall logs = Information about network traffic and security VPN audit logs = Information about VPN access and security</p> Signup and view all the answers

    Match the following types of cybercrime with their descriptions:

    <p>Hacking/Misusing Computer Networks = Unauthorized access to private computers or networks Identity Theft = Using another person's personal data to commit fraud or a crime Cybercrime = A type of crime that involves computers or networks Society Cybercrimes = Cyber-terrorism</p> Signup and view all the answers

    Match the following concepts with their importance in DFIR investigation:

    <p>Data protection = Keep information about the case safe and protected Data analysis = Analyze data to determine the cause of an incident Data collection = Collect data from various sources Data storage = Store evidence data securely</p> Signup and view all the answers

    Match the following concepts with their uses in incident response:

    <p>IR process = Structured approach to incident detection, response, and resolution Training and documentation = Important for IR team to know the process and procedures Hardware and software solutions = Tools used to perform IR tasks Investigation = Process of gathering and analyzing evidence</p> Signup and view all the answers

    Match the following incident response checks with their corresponding descriptions:

    <p>Incident Summary Checklist = Gathers information about the incident Incident Detection Checklist = Examines the system's details and the nature of the incident Network Details Checklist = Provides information about the external malicious IP addresses and network configurations Malware Details Checklist = Details about the malware's detection and analysis</p> Signup and view all the answers

    Match the following with their primary purposes in incident response:

    <p>Incident Summary = To provide overall context about the incident System Administrator = To manage the system's resources and access Network Monitoring = To detect and track malicious activity on the network Data Preservation = To store evidence securely for further analysis</p> Signup and view all the answers

    Match the following types of incident response checks with the information they collect:

    <p>Incident Detection = Time of incident detection and the person who detected it Network Details = List of external malicious IP addresses and domain names Malware Details = Name of the malicious file and its directory System Details = System's make, model, and primary function</p> Signup and view all the answers

    Match the following factors with their roles in incident response:

    <p>Nature of the Case = Determines the scope of the investigation Amount of Data Collected = Influences the analysis and evidence collection Search Warrant and Court Orders = Provides legal authority for evidence collection Policies = Guides the incident response process</p> Signup and view all the answers

    Match the following with their roles in computer forensics:

    <p>DF Examiner = Analyzes the evidence and provides reports System Administrator = Manages the system's resources and access Investigator = Collects and analyzes evidence IR Team = Responds to and resolves incidents</p> Signup and view all the answers

    Match the following with their characteristics in digital forensics:

    <p>Authentic = Ensures the evidence is genuine Complete = Includes all relevant data Reliable = Proven to be accurate and trustworthy Believable = Supported by credible evidence</p> Signup and view all the answers

    Match the following with their roles in digital forensics:

    <p>FTK Imager = Creates forensic images of local hard drives and other storage devices DFL = Analyzes digital evidence and provides reports Disk Imaging = Creates a bit-for-bit copy of a digital storage device RAM Dump = Captures the contents of a computer's RAM</p> Signup and view all the answers

    Match the following with their purposes in incident response:

    <p>Incident Response = To respond to and resolve incidents effectively Evidence Collection = To gather facts and data for analysis Incident Detection = To identify potential incidents and prevent further damage System Analysis = To understand the system's behavior and performance</p> Signup and view all the answers

    Match the following with their roles in incident response:

    <p>IR Team = Responds to and resolves incidents System Administrator = Manages the system's resources and access DF Examiner = Analyzes the evidence and provides reports Investigator = Collects and analyzes evidence</p> Signup and view all the answers

    Match the following with their importance in incident response:

    <p>Context = Helps to understand the incident's scope and impact Data Preservation = Ensures the integrity of the evidence System Analysis = Provides insights into the system's behavior and performance Incident Detection = Identifies potential incidents and prevents further damage</p> Signup and view all the answers

    Match the following disk imaging formats with their features:

    <p>RAW = Stores all data from the original medium EWF = Contains features like Compression of data and Error-Checks AFF = Can be used for creating perfect copies of the original evidence DD = Stores all data from the original medium</p> Signup and view all the answers

    Match the following FTK Imager features with their descriptions:

    <p>HASH REPORTS = Generate hash reports for regular files and disk images RAM CAPTURE = Allows you to perform memory capture or registry capture on a live device DISK IMAGING = Create perfect copies of the original evidence without making any changes to original evidence CASE METADATA = Contains information about running processes, active network connections, open files, encryption keys, and passwords</p> Signup and view all the answers

    Match the following RAM dump features with their descriptions:

    <p>Volatile nature = Holds data temporarily while a computer is powered on Dynamic and live information = Contains real-time information about running processes, active network connections, open files, encryption keys, and passwords Uncovering hidden data = Reveals information about active malware, hidden processes, encrypted data in memory, or remnants of deleted files Preserves data after shutdown = Capturing a RAM dump becomes essential to preserve valuable evidence</p> Signup and view all the answers

    Match the following computer forensics lab domains with their descriptions:

    <p>Active-system analysis = Deals with forensic information, user activity and log reports based off an actively running operating system Static media examination = Focuses on removable flash drives, external and internal hard disks, and other types of storage media that persists after a computer is shut down Digital Forensics Lab = A tightly controlled area for various levels of computer examination DFIR = Divides computer forensics labs into two domains: active-system analysis and static media examination</p> Signup and view all the answers

    Match the following tools with their descriptions:

    <p>FTK Imager = An open-source software used for creating accurate copies of the original evidence without making any changes to original evidence Magnet Ram Capturer = A tool used for RAM capture or registry capture on a live device Volatility Framework = An open-source framework used for RAM dump analysis EnCase Forensic = A tool used for searching, identifying, and prioritizing potential evidence across computers, laptops, and mobile devices</p> Signup and view all the answers

    Match the following disk imaging features with their descriptions:

    <p>Compression of data = Reduces the size of the image file Encryption of data = Secures the image file with a password or encryption key Error-Checks = Verifies the integrity of the image file Splitting the image in chunks = Divides the image file into smaller manageable chunks</p> Signup and view all the answers

    Match the following digital forensics concepts with their descriptions:

    <p>Tolerance of hardware errors = Allows for the creation of accurate copies of the original evidence despite hardware errors Hash sums = Verifies the integrity of the image file Case Metadata = Contains information about the case evidence Disk Imaging = Creates a perfect copy of the original evidence without making any changes to original evidence</p> Signup and view all the answers

    Match the following digital forensics tools with their uses:

    <p>FTK Imager = Used for creating forensic images of local hard drives, floppy disks, Zip disks, CDs, and DVDs Magnet Ram Capturer = Used for RAM capture or registry capture on a live device Volatility Framework = Used for RAM dump analysis EnCase Forensic = Used for searching, identifying, and prioritizing potential evidence across computers, laptops, and mobile devices</p> Signup and view all the answers

    Match the following digital forensics features with their descriptions:

    <p>HASH REPORTS = Generate hash reports for regular files and disk images RAM CAPTURE = Allows you to perform memory capture or registry capture on a live device CASE METADATA = Contains information about the case evidence DISK IMAGING = Creates a perfect copy of the original evidence without making any changes to original evidence</p> Signup and view all the answers

    Match the following digital forensics concepts with their descriptions:

    <p>Volatile memory = Holds data temporarily while a computer is powered on Dynamic and live information = Contains real-time information about running processes, active network connections, open files, encryption keys, and passwords RAM dump = Captures the contents of a computer's memory Disk imaging = Creates a perfect copy of the original evidence without making any changes to original evidence</p> Signup and view all the answers

    Match the following Windows event logs with their descriptions:

    <p>Security = contains incidents related to security events Setup = captures incidents of installation or upgrading of the Windows operating system System = contains messages generated by the Windows operating system Forwarded Events = contains events which are forwarded by other computers</p> Signup and view all the answers

    Match the following steps with the guidelines for handling digital evidence:

    <p>Label and seal = Uniquely label and seal the evidence with a proper container Document = Details of the device including type, serial number, and manufacture Not left unattended = Keep the evidence away from any source of contamination Preservation = Keep the original evidence safe</p> Signup and view all the answers

    Match the following steganography techniques with their descriptions:

    <p>Embedding text in a picture = Hiding sensitive information within an image file Backward masking a message in an audio file = Concealing information in an audio file Concealing information in metadata = Hiding data in file headers or metadata Hiding an image in a video = Concealing data in a video file</p> Signup and view all the answers

    Match the following log levels with their descriptions:

    <p>Error = important in terms of forensic investigations Audit Success = important in terms of forensic investigations Audit Failure = important in terms of forensic investigations Information = provides insight about the incidents occurred on the system</p> Signup and view all the answers

    Match the following incident response tools with their descriptions:

    <p>Splunk = is a critical step toward ensuring that your environment can support effective incident response LogRhythm = is a critical step toward ensuring that your environment can support effective incident response Varonis = is a critical step toward ensuring that your environment can support effective incident response EnCase = helps investigators quickly search, identify, and prioritize potential evidence</p> Signup and view all the answers

    Match the following forensic tools with their purposes:

    <p>Stegdetect = Detecting steganography in digital files Xsteg = Identifying hidden information in files StegAlyzerAS = Analyzing digital files for steganography StegSpy = Detecting and extracting hidden data</p> Signup and view all the answers

    Match the following EnCase features with their descriptions:

    <p>Acquisition = includes Smartphone and Tablet support Processing = automate common tasks associated with preparing evidence for investigation Deep Forensic Analysis = includes new supported files and encryption support Reporting = includes customizable templates and easy export options</p> Signup and view all the answers

    Match the following data types with their extraction methods:

    <p>Emails = Extracting emails from digital devices Internet Browsers = Analyzing browser history and cache Pictures and Videos = Extracting multimedia files using hash comparison Software = Analyzing installed software and applications</p> Signup and view all the answers

    Match the following Windows Event Logs channels with their descriptions:

    <p>Application = Contains information logged by applications on the system System = Stores system-level events and errors Security = Logs security-related events and activities Setup = Tracks system setup and configuration events</p> Signup and view all the answers

    Match the following mobile digital forensics software features with their descriptions:

    <p>Call logs = can extract data Photos = can extract data Browsers history = can extract data Deleted files = can extract data</p> Signup and view all the answers

    Match the following digital forensic tools with their descriptions:

    <p>EnCase Forensic = Helps investigators quickly search and identify potential evidence FTK Imager = Creates accurate copies of the original evidence StegAlyzerAS = Analyzes digital files for steganography StegSpy = Detects and extracts hidden data</p> Signup and view all the answers

    Match the following digital forensics examiners' goals with their descriptions:

    <p>Extract all passcodes = prior to conducting the work Extract all passwords = prior to conducting the work Extract all patterns = prior to conducting the work Gather all evidence = prior to conducting the work</p> Signup and view all the answers

    Match the following Windows event logs storage locations with their descriptions:

    <p>System32/winevt/Logs = stores event logs in XML format System32/Logs = stores event logs in XML format System/Winevt/Logs = stores event logs in XML format Winevt/Logs = stores event logs in XML format</p> Signup and view all the answers

    Match the following digital forensic concepts with their descriptions:

    <p>Anti-static shielding bags = Protects electronic items from damage during transportation and storage Physical extraction = Retrieves the device's file system and interprets the data during processing Logical extraction = Recovers deleted files and data Disk images = A bit-for-bit copy of a digital storage device</p> Signup and view all the answers

    Match the following incident response steps with their descriptions:

    <p>Gathering facts = Collecting information about the incident Log analysis = Analyzing logs to identify incident details Network monitoring = Monitoring network traffic for suspicious activity Incident detection = Identifying and reporting suspicious events</p> Signup and view all the answers

    Match the following incident response activities with their descriptions:

    <p>Configuring adequate logging = is a critical step toward ensuring that your environment can support effective incident response Aggregating logs = is a critical step toward ensuring that your environment can support effective incident response Analyzing logs = is a critical step toward ensuring that your environment can support effective incident response Responding to incidents = is a critical step toward ensuring that your environment can support effective incident response</p> Signup and view all the answers

    Match the following EnCase Forensic features with their descriptions:

    <p>Tagging = creates custom tags and applies to any file Unified Search = searches across the entire case from one easy to use interface Index = includes hash records and enables easy export of files Reporting = includes customizable templates and easy export options</p> Signup and view all the answers

    Match the following cybercrime types with their descriptions:

    <p>Cyber extortion = Demanding money or favors in exchange for not causing harm Cyber bullying = Targeting individuals or systems with harmful activities Social media fraud = Using social media to commit fraud or harm Property Cybercrimes = Targeting individuals' personal information</p> Signup and view all the answers

    Match the following log aggregator tools with their descriptions:

    <p>SIEM = is a critical step toward ensuring that your environment can support effective incident response ManageEngine = is a critical step toward ensuring that your environment can support effective incident response IBMQRadar = is a critical step toward ensuring that your environment can support effective incident response SolarWinds = is a critical step toward ensuring that your environment can support effective incident response</p> Signup and view all the answers

    Match the following digital forensic techniques with their descriptions:

    <p>JTAG and Chip-Off = Extracting data from damaged or locked mobile devices Memory imaging = Capturing a snapshot of a device's memory Steganography = Hiding sensitive information within ordinary files Hash reports = Verifying the integrity of digital evidence</p> Signup and view all the answers

    Match the following mobile device data extraction methods with their descriptions:

    <p>Logical Extraction = Receiving information from the mobile device and allowing it to present the data for analysis. File System Dump (FSD) = A hybrid of Physical Extraction and Logical Extraction, retrieving the device's file system and interpreting the data during processing. Physical Extraction = Acquiring raw binary data from the media storage of the device and analyzing it later. Manual Extraction = Accessing the device and recording data displayed on the screen with photographs or video.</p> Signup and view all the answers

    Match the following data types with the methods that can extract them:

    <p>Live Data = Logical Extraction Deleted Files = Physical Extraction Databases holding deleted messages = File System Dump (FSD) Raw Binary Data = JTAG / Chip-Off / Rooting / Jail Breaking</p> Signup and view all the answers

    Match the following limitations with the data extraction methods:

    <p>Cannot recover deleted files = Logical Extraction Does not retrieve all deleted data = File System Dump (FSD) Requires high technical skill = JTAG / Chip-Off / Rooting / Jail Breaking Limited by device model or recent launch = Manual Extraction</p> Signup and view all the answers

    Match the following data extraction methods with their benefits:

    <p>Logical Extraction = Allows access to live data only Physical Extraction = Allows access to live and deleted data, operating system files, and areas not normally accessible to the user. File System Dump (FSD) = Retrieves databases holding deleted messages and may not be accessible during a physical extraction JTAG / Chip-Off / Rooting / Jail Breaking = Allows extraction of raw binary data from damaged or locked devices</p> Signup and view all the answers

    Match the following data extraction methods with the devices they are suitable for:

    <p>Logical Extraction = All mobile devices Physical Extraction = Most mobile devices, except those with encryption File System Dump (FSD) = Most mobile devices, except those with encryption JTAG / Chip-Off / Rooting / Jail Breaking = Damaged or locked devices, and IOT devices</p> Signup and view all the answers

    Match the following data extraction methods with the level of technical skill required:

    <p>Logical Extraction = Low technical skill Physical Extraction = Moderate technical skill File System Dump (FSD) = Moderate technical skill JTAG / Chip-Off / Rooting / Jail Breaking = High technical skill</p> Signup and view all the answers

    Match the following data extraction methods with the type of data retrieved:

    <p>Logical Extraction = Live data only Physical Extraction = Live and deleted data, operating system files, and areas not normally accessible to the user File System Dump (FSD) = Databases holding deleted messages and live data Manual Extraction = Data displayed on the screen</p> Signup and view all the answers

    Match the following data extraction methods with the limitations of forensic software:

    <p>Logical Extraction = Cannot recover deleted files Physical Extraction = Cannot access devices with encryption File System Dump (FSD) = Does not retrieve all deleted data Manual Extraction = Limited by device model or recent launch</p> Signup and view all the answers

    Match the following data extraction methods with the risks involved:

    <p>Logical Extraction = No risk of data loss Physical Extraction = No risk of data loss File System Dump (FSD) = No risk of data loss Chip-Off = Device will be damaged and can no longer be used</p> Signup and view all the answers

    Match the following data extraction methods with the level of data analysis required:

    <p>Logical Extraction = Minimal analysis required Physical Extraction = Moderate analysis required File System Dump (FSD) = Moderate analysis required JTAG / Chip-Off / Rooting / Jail Breaking = High analysis required</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser