Review Questions - SYS701 - 15 - Digital Forensics
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Felix wants to make an exact copy of a drive using a Linux command-line tool as part of a forensic acquisition process. What command should he use?

  • df
  • cp
  • dd (correct)
  • ln

Greg is preparing a forensic report and needs to describe the tools that were used. What should he report about the tools in addition to their names?

  • The type of system the tools were installed or run on
  • The training level or certifications of the team that uses the tools
  • Any known limitations or issues with the tools (correct)
  • The patch level or installed version of the tools

Gabby is preparing chain-of-custody documentation and identifies a gap in hand-off documentation for an original source forensic drive. What issue should she expect to encounter due to this gap?

  • The evidence may not be admissible in court. (correct)
  • The forensic activities may need to be repeated.
  • The staff involved may have to re-create the missed log.
  • The chain of custody may need to be edited to note the problem.

Mike's organization has recently moved to a SaaS cloud service and needs to collect forensic data from the cloud service. What process can Mike use to gather the information he needs?

<p>Identify the log information available and request any other desired information from the cloud service provider. (B)</p> Signup and view all the answers

Charles wants to obtain a forensic copy of a running virtual machine. What technique should he use to capture the image?

<p>Use the VM host to create a snapshot. (C)</p> Signup and view all the answers

Melissa wants to capture network traffic for forensic purposes. What tool should she use to capture it?

<p>Wireshark (B)</p> Signup and view all the answers

Frank is concerned about the admissibility of his forensic data. Which of the following is not an element he should be concerned about?

<p>Whether the forensic information includes a time stamp (D)</p> Signup and view all the answers

What is the document that tracks the custody or control of a piece of evidence called?

<p>Chain of custody (D)</p> Signup and view all the answers

Isaac is performing a forensic analysis on two systems that were compromised in the same event in the same facility. As he performs his analysis, he notices that the event appears to have happened almost exactly one hour earlier on one system than the other. What is the most likely issue he has encountered?

<p>One system is set to an incorrect time zone. (B)</p> Signup and view all the answers

What legal concept determines the law enforcement agency or agencies that will be involved in a case based on location?

<p>Jurisdiction (C)</p> Signup and view all the answers

Michael wants to acquire the firmware from a running device for analysis. What method is most likely to succeed?

<p>Use forensic memory acquisition techniques. (A)</p> Signup and view all the answers

Charles needs to know about actions an individual performed on a PC. What is the best starting point to help him identify those actions?

<p>Interview the individual. (C)</p> Signup and view all the answers

Maria has acquired a disk image from a hard drive using dd, and she wants to ensure that her process is forensically sound. What should her next step be after completing the copy?

<p>Compare the hashes of the source and target drive. (C)</p> Signup and view all the answers

Alex has been handed a flash media device that was quick-formatted and has been asked to recover the data. What data will remain on the drive?

<p>Files will remain but file indexes will not. (B)</p> Signup and view all the answers

Naomi is preparing to migrate her organization to a cloud service and wants to ensure that she has the appropriate contractual language in place. Which of the following is not a common item she should include?

<p>Right to forensic examination (B)</p> Signup and view all the answers

Alaina wants to maintain chain-of-custody documentation and has created a form. Which of the following is not a common element on a chain-of-custody form?

<p>Method of transport (D)</p> Signup and view all the answers

Henry is following the EDRM model and is preparing to review data. What two key tasks occur during this stage?

<p>Validating that the desired data is included and that information that should not be shared is not included (C)</p> Signup and view all the answers

Theresa's organization has received a legal hold notice for their files and documents. Which of the following is not an action she needs to take?

<p>Delete all sensitive documents related to the case. (C)</p> Signup and view all the answers

Gurvinder wants to follow the order of volatility to guide his forensic data acquisition. Which of the following is the least volatile?

<p>Backups (C)</p> Signup and view all the answers

What is the key difference between hashing and checksums?

<p>Both can validate integrity, but a hash also provides a unique digital fingerprint. (A)</p> Signup and view all the answers

Flashcards

What is 'dd'?

A Linux command-line tool used to create an exact copy of a drive.

Tool Reporting

Report any known limitations or issues associated with the tools.

Chain-of-Custody Gap Implication

The evidence may not be admissible in court.

Cloud Forensic Data Collection

Request available logs and other needed info from the provider.

Signup and view all the flashcards

Forensic Copy of a VM

Use the VM host to create a snapshot of the running virtual machine.

Signup and view all the flashcards

Network Traffic Capture Tool

Wireshark is a tool used to capture network traffic.

Signup and view all the flashcards

Chain of Custody

A document that tracks the custody and control of evidence.

Signup and view all the flashcards

Time Zone Issue

One system is likely set to an incorrect time zone.

Signup and view all the flashcards

Jurisdiction

Legal concept determining which agencies handle a case by location.

Signup and view all the flashcards

Acquiring Firmware from Running Device

Use forensic memory acquisition techniques.

Signup and view all the flashcards

Best Starting Point for PC Actions

Interview the individual.

Signup and view all the flashcards

Verify Forensic Soundness

Compare the hashes of the source and target drive.

Signup and view all the flashcards

Quick-Formatted Drive Data

Files will remain but file indexes will not.

Signup and view all the flashcards

Hashing vs. Checksums

Hashing validates integrity and provides a unique digital fingerprint.

Signup and view all the flashcards

Data Review Key Tasks

Validating data inclusion/exclusion occurs during data review.

Signup and view all the flashcards

Least Volatile Data

Backups are the least volatile.

Signup and view all the flashcards

Uncommon Cloud Contract Item

Right to forensic examination is NOT common.

Signup and view all the flashcards

Uncommon Chain-of-Custody Element

Method of transport is NOT a common element.

Signup and view all the flashcards

Action to NOT take after Legal Hold Notice

Do not delete sensitive documents related to the case.

Signup and view all the flashcards

Element NOT of Concern for Forensic Data Admissibility

Whether the forensic information includes a time stamp

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser