4.5 Flashcards

1
Q

What is Digital Forensics

A
  • Collect and protect information relating to an intrusion.

- Need to be detail oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the guidelines for Digital Forensics

A

RFC 3227

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a legal hold

A
  • a legal technique to preserve relevant information
  • Hold notification
  • Separate repository for electronically stored information (ESI)
  • Ongoing preservation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a capture video

A
  • A moving record of the event
  • Captures the status of the screen and the other volatile information
  • Don’t forget security cameras and your phone
  • The video content must be archived
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name five points of admissibility

A
  • Not all data can be sued in a court of law
  • Legal authorization
  • Procedures and tools
  • Laboratories
  • Technical and academic qualifications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control evidence, everyone who contacts the evidence, and label and cataloging everything is part of what system

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recording time offsets

A
  • The time zone determines how the time is displayed
  • Different file systems store timestamps differently
  • Record the time offset from the operating system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name an event log and what does it do. Where would it be stored

A
  • A system log
  • Exports and stores for future reference
  • Log store:
    Linux: /var/log
    Windows: Event Viewer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Order of Volatility

A

How long does data stick around.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the Order of volatility from most to least volatile

A
  • CPU registers, CPU cache
  • Router table, ARP cache, process table, kernel statistics, memory
  • Temporary file systems
  • Disk
  • Remote logging and monitoring data
  • Physical configuration, network topology
  • Archival media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Right to audit clauses

A

a legal agreement that allows the following option(s):

  • To perform a security audit at any time
  • Allows the ability to verify security before a breach occurs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data breach notification laws

A

If consumer data is breached, the consumer must be informed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does Hashing help to preserve integrity

A

Hashing leaves a digital fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do Checksums help to preserve integrity

A

Protects against accidental changes during transmission. It is not designed to replace a hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does a Provenance help to preserve integrity

A

Documentation of authenticity

a chain of custody for data handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 3 skills one should have when preserving evidence and name an example for each

A
Handling evidence
- Isolate and protect the data
Managing the collection process
- Work from copies
Live collection 
- Data may be encrypted or difficult to collect after powering down
17
Q

What is E-discovery

A
  • Collect prepare, review, interpret, and produce electronic documents
18
Q

Data recovery

A

Extract missing data without affecting the integrity of the data

19
Q

Non-repudiation

A

Proof of data integrity and the origin of the data.

20
Q

True or False Message Authentication Code (MAC) can be used to verify non-repudiation

A

The two parties can verify non-repudiation

21
Q

Difference between Strategic intelligence and Strategic counterintelligence

A

Strategic intelligence is a focus on key threat activity for a domain for a example a business sector

Strategic counterintelligence is a focus to prevent hostile intelligence operations