3.2 Cyber Incident Response Flashcards

1
Q

what is the best method to preserve evidence on a computer: bit stream backup or standard backup?

A

bit stream backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the order of volatility from most volatile to least volatile?

A

registers, cache

swap space

routing table, ARP cache, process table, kernel statistics, and memory

temporary file systems

disk

remote logging and monitoring data that is relevant to the system in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the FOUR documents/forms that should be part of forensic kit?

A

chain of custody form, incident response plan, incident form, call list/escalation list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a write blocker?

A

a tool that permits read-only access to data storage devices without compromising the integrity of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the purpose of imaging utilities included in a forensic kit?

A

to create a bit-level copy of drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the NINE components that should be included in a forensic kit?

A
  1. digital forensics workstation
  2. write blockers
  3. cables
  4. drive adaptors
  5. wiped removable media
  6. camera
  7. crime tape
  8. tamper-proof seals
  9. documentation/forms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the purpose of the chain of custody form?

A

it will indicate who has handled the evidence, when they handled it, and the order in which the handler was in possession of the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which condition must be true of the hash values of a file to prove the file is unaltered?

A

the hash values must remain the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a SCADA device?

A

a system operating with coded signals over communication channels that provides control of remote equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the purpose of tamper-proof seals?

A

to ensure that the chain of custody is maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the purpose of hashing utilities included in a forensic kit?

A

to create a hash value of files so that you can prove that certain evidence has not been altered during your possession of the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the proper life cycle of evidence steps?

A

collection, analysis, storage, court presentation, and return to owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a digital forensics workstation?

A

a dedicated workstation for processing an investigation that includes special tools and utilities that make the process easier and more productive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the purpose of an incident form?

A

it is used to describe the incident in detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

why should the proper chain of custody be ensured?

A

so that evidence will be admissible in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the purpose of the analysis utilities included in a forensic kit?

A

to analyze the bit-level copy that is created for that purpose

17
Q

what are the three basic questions answered by the chain of custody?

A

who controlled the evidence

who secured the evidence

who obtained the evidence

18
Q

when evidence is seized, which principle should be emphasized?

A

chain of custody

19
Q

what is indicated when the hash values on a file are different?

A

the file has been altered