CySa+ Study Notes 8 Flashcards

1
Q

heuristic analysis : software can use techniques to determine whether a set of data points are similar enough to a set signature that an alert should be generated.

Behavioral Analysis : anything that deviates from the baseline generates an alert.

Anomaly Analysis : process of defining an expected outcome or pattern to events, and then identifying any events that do not follow these patterns.

A

info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

awk is a scripting engine geared toward modifying and extracting data from files or data streams, which can be useful in preparing data for analysis. Programs and scripts run in awk are written in the AWK programming language.

(WMIC) is used to review log files on a remote Windows machine.

A

info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identification Phase : Ensure that the scene is safe. Secure the scene to prevent contamination of evidence. Identify the scope of evidence to be collected.

Collection Phase : Ensure authorization to collect the evidence. Use tools and methods that will withstand legal scrutiny.

Document and prove the integrity of evidence. Store evidence in secure, tamper-evident packaging.

Analysis Phase : Create a verifiable copy of evidence for analysis. Use repeatable methods and tools to analyze the evidence.

Reporting Phase : Create a report of the methods and tools used. Present findings and conclusions.

A

Digital Forensic Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

??? is the process of obtaining a forensically clean copy of data from a device held as evidence.

A

Data Aquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CPU Registers and cache memory (including cache on disk controllers, GPUs etc …)

  • > Contents of RAM including : routing table, ARP cache, process table, kernel statistics, temporary file systems/swap space/virtual memory.
  • > HDD/SSD, flash memory including file system and free space
  • > remote logging and monitoring data
  • > physical and network topology -> archival media.
A

Order of Volatility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

??? is an open-source collection of command line tools and programming libraries for disk imaging and file analysis. Autopsy is a graphical front-end for these tools and acts as a case management/workflow tool.

A

The Sleuth Kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

??? creates an image file that can be analyzed to identify the processes that are running, the contents of temporary file systems, Registry data, network connections, cryptographic keys, etc …

A

System Memory Dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

??? a specialist hardware or software tool can capture the contents of memory while the computer is running. Unfortunately, this type of tool needs to be pre-installed as it requires a kernel mode driver to function.

A

Live Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

??? when Windows encounters an unrecoverable kernel error, it can write contents of memory to a dump file.

A

Crash dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

??? This file is created on disk when the computer is put into a sleep state. If it can be recovered, the data can be decompressed and loaded into a software tool for analysis. The drawback is that network connections will have been closed, and malware may have detected the use of a sleep state and performed antiforensics.

A

Hibernation File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly