Ch. 7 Flashcards

1
Q

Investigators can use Linux commands to gather necessary information from the system. What shell command is used to display the kernel ring buffer or information about device drivers loaded into the kernel?

A

dmesg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is not volatile information in Linux?

A

User accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some date- and time-related commands in Linux?

A
  • date
  • uptime
  • timezone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Forensic investigators should use the “netstat -rn” command to view routing table information. In this command, what does the “-n” flag provide?

A

Lists numerical addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The nmap command can only be used to identify TCP port connections. True/False

A

False. The nmap command is run with different options/flags for TCP and UDP port connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Linux command lists the open files for the user currently logged into a system?

A

lsof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The state of nonvolatile data changes when a machine is turned off. True/False

A

False. Nonvolatile data does not change when the machine is turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Linux systems, where is local user information saved?

A

/etc/passwd file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What log file in a Linux system cannot be used by forensic investigators?

A

/var/log/evtx.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital files generally have a signature that can be found in the first 20 bytes of the file. True/False

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The macOS is one of the most widely adopted systems worldwide, and with the increase in its usage, the number of cyberattacks it faces has decreased significantly. True/False

A

False. The number of cyber-attacks it faces has increased significantly for macOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What OS is macOS based on?

A

Unix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does macOS store user settings in the form of?

A

A plist file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the built-in manager that saves credentials for websites, wireless networks, SSH servers, and private keys for macOS?

A

Keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What directory has the printer log files for macOS?

A

/var/log/cups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Where is the trash directory located on a macOS?

A

%%users.homedir%%/.Trash/

17
Q

Parsing Spotlight’s central repository is of great forensic value. What details can it not provide?

A

Deleted file information

18
Q

What are some Mac forensic tools?

A
  • Memoryze
  • F-Response
  • RECON IMAGER