Chapter 13 Flashcards

1
Q

What are the components of a forensic toolkit?

A

Workstation
Cables and adapters
Forensic software
Write blockers
Duplicators and clones
Removable media (USB)
Camera
Labeling supplies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 types of carving?

A

File based
Content
Header and footer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is it called when a set of tools look at data in sections or block by block?

A

Carving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you validate files and images?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which hashing algorithm is used because it’s fast and available everywhere?

A

MD 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which hashing algorithm is used because it’s low risk

A

Sha-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a method used by Linux to pull human readable text

A

Strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it called when attackers use A method that makes code difficulty to read and is apart of a malware package?

A

Packers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is built in forensics toolkits to look up similar information to compare?

A

Log viewers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is wireShark’s nickname?

A

Packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Linux utilities tools are used to sort and analyze packet data?

A

Topdump and prep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

. What are disadvantages of using containers in forensics?

A

Don’t last long in the system
Designed to be disposable
May cause you to lose your forensic evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the 3 areas that are focused on in the post-incident Analysis phase?

A

Root cause analysis
Forensic analysis
Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is the post-incident analysis phase during or after the incident?

A

During (despite post means after)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the 2 output by using forensic analysis?.
Forensic analysis = x+y

A

Root cause
Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Also known as litigation holds
Requires companies to hold onto (preserve) data for a set period of time

A

Legal holds

17
Q

Describe in your own words what bit by bit copying means?

A

Everything is copied to include deleted files, old, old data that has not been overwritten and any leftover space

18
Q

Which Linux utility command is used to clone drives for in raw format to ensure imaging is done right and quickly.

A

Dd utility

19
Q

What information does a chain of custody include?

A

. What was collected
Who collected it
When it was collected
What devices were used

20
Q

. What does using write blockers do for people like the FBI?

A

. Allows agents to clone the targeted drive to ensure no data is altered and all forensic evidence is collected

21
Q

. Name the disadvantages live imaging

A

May leave leftover data from the imaging process
Contents may change
Malware may detect the imaging
Does not copy the unallocated space

22
Q

What type of capture collects all of the systems before it shuts off because it will be lost

A

Memory capture

23
Q

Which tools are used for memory capture

A

Dump it
F mem
Lime
Encase
FTK

24
Q

What ave the 4 primary modes of data acquisition from a mobile device?

A

Physical- SIM card
Logical
Manual access- looking at all of the phone’s data if it’s unlocked
File system - looks at existing and deleted files