15 Digital Forensics Flashcards

1
Q

What drives forensic activities in organizations?

A

Legal holds and e-discovery processes

Legal holds require organizations to preserve and protect relevant information for active or pending cases, while e-discovery involves providing forensic data as part of legal cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What must organizations build to respond to legal holds and e-discovery requirements?

A

Capability and technology to respond appropriately

This is essential to avoid losing cases in court and to support incident response processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the principle of order of volatility?

A

A principle used to determine the most and least volatile system components

Forensic practitioners use this to decide what to capture first during an acquisition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do acquisition techniques and procedures ensure?

A

Usable and admissible forensic data

They are crucial since different system components may change or be lost during the forensic acquisition process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a key aspect of the forensic acquisition process?

A

Taking into account the order of volatility and acquisition circumstances

This is vital as part of incident response or legal holds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do image acquisition tools do?

A

Copy disks and volumes using a bit-by-bit method

This captures the complete image including unused or slack space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What must incident responders maintain while capturing data?

A

A chain of custody

This is critical alongside the technical requirements of the systems or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is hashing used for in the forensic process?

A

To ensure acquired data matches its source

Commonly used hashing methods include MD5 and SHA1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a limitation of checksums in forensic data validation?

A

They do not create unique fingerprints like hashes

Checksums can ensure data is unchanged but lack the specificity of hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What must forensic reports summarize?

A

Key findings of the forensic analysis

They should also explain the processes, procedures, tools, and any limitations impacting the investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do forensic reports conclude with?

A

Recommendations or overall conclusions

These conclusions should be more detailed than the summary provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: Forensic practitioners use _______ to ensure data integrity.

A

Hashing

Hashing helps verify that the acquired data has not been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: The forensic analysis ends when the technical examination is complete.

A

False

Forensic analysis continues with the creation of detailed reports outlining findings and methodologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly