D431-Digital Forensics in Cybersecurity - After 2nd Attempt Flashcards

Review Red Items

1
Q

Where on a Windows system is the config folder located that contains the SAM file?

A

C:\Windows\System32

The SAM (Security Accounts Manager) file, which stores Windows user passwords in encrypted form, is typically located in the “C:\Windows\System32\config” directory on a Windows system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Windows component is responsible for reading the boot.ini file and displaying the boot loader menu on Windows XP during the boot process?

A

NTLDR

In Windows XP, the component responsible for reading the boot.ini file and displaying the boot loader menu during the boot process is called NTLDR (NT Loader).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which method is used to implement steganography through pictures?

A

LSB

Least Significant Bit (LSB) insertion: This method involves replacing the least significant bits of the pixels in an image with hidden data. Since these alterations are often imperceptible to the human eye, they can conceal information within the image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A criminal organization has compromised a third-party web server and is using it to control a botnet. The botnet server hides command and control messages through the DNS protocol.

Which steganographic component are the command and control messages?

A

Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

During a cyber-forensics investigation, a USB drive was found that contained multiple pictures of the same flower.

How should an investigator use properties of a file to detect steganography?

A

Review the hexadecimal code looking for anomalies in the file headers and endings using a tool such as EnCase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly