Podcast
Questions and Answers
Felix wants to make an exact copy of a drive using a Linux command-line tool as part of a forensic acquisition process. What command should he use?
Felix wants to make an exact copy of a drive using a Linux command-line tool as part of a forensic acquisition process. What command should he use?
- df
- cp
- dd (correct)
- ln
Greg is preparing a forensic report and needs to describe the tools that were used. What should he report about the tools in addition to their names?
Greg is preparing a forensic report and needs to describe the tools that were used. What should he report about the tools in addition to their names?
- The type of system the tools were installed or run on
- The training level or certifications of the team that uses the tools
- Any known limitations or issues with the tools (correct)
- The patch level or installed version of the tools
Gabby is preparing chain-of-custody documentation and identifies a gap in hand-off documentation for an original source forensic drive. What issue should she expect to encounter due to this gap?
Gabby is preparing chain-of-custody documentation and identifies a gap in hand-off documentation for an original source forensic drive. What issue should she expect to encounter due to this gap?
- The evidence may not be admissible in court. (correct)
- The forensic activities may need to be repeated.
- The staff involved may have to re-create the missed log.
- The chain of custody may need to be edited to note the problem.
Mike's organization has recently moved to a SaaS cloud service and needs to collect forensic data from the cloud service. What process can Mike use to gather the information he needs?
Mike's organization has recently moved to a SaaS cloud service and needs to collect forensic data from the cloud service. What process can Mike use to gather the information he needs?
Charles wants to obtain a forensic copy of a running virtual machine. What technique should he use to capture the image?
Charles wants to obtain a forensic copy of a running virtual machine. What technique should he use to capture the image?
Melissa wants to capture network traffic for forensic purposes. What tool should she use to capture it?
Melissa wants to capture network traffic for forensic purposes. What tool should she use to capture it?
Frank is concerned about the admissibility of his forensic data. Which of the following is not an element he should be concerned about?
Frank is concerned about the admissibility of his forensic data. Which of the following is not an element he should be concerned about?
What is the document that tracks the custody or control of a piece of evidence called?
What is the document that tracks the custody or control of a piece of evidence called?
Isaac is performing a forensic analysis on two systems that were compromised in the same event in the same facility. As he performs his analysis, he notices that the event appears to have happened almost exactly one hour earlier on one system than the other. What is the most likely issue he has encountered?
Isaac is performing a forensic analysis on two systems that were compromised in the same event in the same facility. As he performs his analysis, he notices that the event appears to have happened almost exactly one hour earlier on one system than the other. What is the most likely issue he has encountered?
What legal concept determines the law enforcement agency or agencies that will be involved in a case based on location?
What legal concept determines the law enforcement agency or agencies that will be involved in a case based on location?
Michael wants to acquire the firmware from a running device for analysis. What method is most likely to succeed?
Michael wants to acquire the firmware from a running device for analysis. What method is most likely to succeed?
Charles needs to know about actions an individual performed on a PC. What is the best starting point to help him identify those actions?
Charles needs to know about actions an individual performed on a PC. What is the best starting point to help him identify those actions?
Maria has acquired a disk image from a hard drive using dd, and she wants to ensure that her process is forensically sound. What should her next step be after completing the copy?
Maria has acquired a disk image from a hard drive using dd, and she wants to ensure that her process is forensically sound. What should her next step be after completing the copy?
Alex has been handed a flash media device that was quick-formatted and has been asked to recover the data. What data will remain on the drive?
Alex has been handed a flash media device that was quick-formatted and has been asked to recover the data. What data will remain on the drive?
Naomi is preparing to migrate her organization to a cloud service and wants to ensure that she has the appropriate contractual language in place. Which of the following is not a common item she should include?
Naomi is preparing to migrate her organization to a cloud service and wants to ensure that she has the appropriate contractual language in place. Which of the following is not a common item she should include?
Alaina wants to maintain chain-of-custody documentation and has created a form. Which of the following is not a common element on a chain-of-custody form?
Alaina wants to maintain chain-of-custody documentation and has created a form. Which of the following is not a common element on a chain-of-custody form?
Henry is following the EDRM model and is preparing to review data. What two key tasks occur during this stage?
Henry is following the EDRM model and is preparing to review data. What two key tasks occur during this stage?
Theresa's organization has received a legal hold notice for their files and documents. Which of the following is not an action she needs to take?
Theresa's organization has received a legal hold notice for their files and documents. Which of the following is not an action she needs to take?
Gurvinder wants to follow the order of volatility to guide his forensic data acquisition. Which of the following is the least volatile?
Gurvinder wants to follow the order of volatility to guide his forensic data acquisition. Which of the following is the least volatile?
What is the key difference between hashing and checksums?
What is the key difference between hashing and checksums?
Flashcards
What is 'dd'?
What is 'dd'?
A Linux command-line tool used to create an exact copy of a drive.
Tool Reporting
Tool Reporting
Report any known limitations or issues associated with the tools.
Chain-of-Custody Gap Implication
Chain-of-Custody Gap Implication
The evidence may not be admissible in court.
Cloud Forensic Data Collection
Cloud Forensic Data Collection
Signup and view all the flashcards
Forensic Copy of a VM
Forensic Copy of a VM
Signup and view all the flashcards
Network Traffic Capture Tool
Network Traffic Capture Tool
Signup and view all the flashcards
Chain of Custody
Chain of Custody
Signup and view all the flashcards
Time Zone Issue
Time Zone Issue
Signup and view all the flashcards
Jurisdiction
Jurisdiction
Signup and view all the flashcards
Acquiring Firmware from Running Device
Acquiring Firmware from Running Device
Signup and view all the flashcards
Best Starting Point for PC Actions
Best Starting Point for PC Actions
Signup and view all the flashcards
Verify Forensic Soundness
Verify Forensic Soundness
Signup and view all the flashcards
Quick-Formatted Drive Data
Quick-Formatted Drive Data
Signup and view all the flashcards
Hashing vs. Checksums
Hashing vs. Checksums
Signup and view all the flashcards
Data Review Key Tasks
Data Review Key Tasks
Signup and view all the flashcards
Least Volatile Data
Least Volatile Data
Signup and view all the flashcards
Uncommon Cloud Contract Item
Uncommon Cloud Contract Item
Signup and view all the flashcards
Uncommon Chain-of-Custody Element
Uncommon Chain-of-Custody Element
Signup and view all the flashcards
Action to NOT take after Legal Hold Notice
Action to NOT take after Legal Hold Notice
Signup and view all the flashcards
Element NOT of Concern for Forensic Data Admissibility
Element NOT of Concern for Forensic Data Admissibility
Signup and view all the flashcards