Digital Forensics Flashcards

1
Q

What is the Forensic Process by NIST?

A

Collection, Examination, Analysis, Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Admissibility?

A

Relatability to disputed facts and violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Order of Volatility?

A

Securing more perishable evidence first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Random Access Memory (RAM)

A

Volatile memory used to run applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the CPU Cache?

A

A fast block of volatile memory used by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is used when RAM is exhausted?

A

Swap/Page File/ Virtual Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does RAM stand for

A

Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can command-line tools be used for?

A

Showing information about the computer and the established ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Chain of Custody?

A

Ensurance of evidence being collected with no breaks in the chain
Crucial Aspect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is it known as when Chain of Custody has been carried out properly?

A

Data Provenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is it known as to protect documents that are evidence?

A

Legal or Litigation hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Artifacts

A

Log files
Registry hives
DNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do we have top take Forensic Copies?

A

For analyzing; we must keep the original data intact and unaltered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do we take System Images

A

To capture a PC and search for criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can be reverse engineered, and is susceptible to rootkit and backdoor attacks?

A

Firmware or Embedded Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why do we take hashes?

A

To analyze data

17
Q

When doing an investigation, where are the places we can look?

A

Network Traffic
Firewall
NIPS
NIDS

18
Q

What do we need to do to in order to use data as evidence in court?

A

Ensure that it is in its original state

19
Q

What is the process known as recovery?

A

Dealing with an incident, and possibly restoring from a backup

20
Q

What Stage is verifying the purpose of cloud forensics?

A

Stage A

21
Q

What Stage is verifying the type of cloud service?

A

Stage B

22
Q

What Stage is verifying the type of technology behind the cloud?

A

Stage C

23
Q

What is Stage D of Cloud Forensic 26?

A

Verifying the role of the user and negotiate with the Cloud Service Provider to collect evidence required

24
Q

Why was Cloud Forensic 26 created?

A

To focus on the competence and admissibility of evidence

25
Q

What is the purpose of a Right-to-Audit Clause?

A

To ensure that the contractor is being compliant with its obligation under contract

26
Q

An agreement between the US and EU to give law enforcement agencies in each country faster access to evidence held by providers

A

General Data Protection Regulation (GDPR)

27
Q

What is the CLOUD act of 2018

A

An act to address the FBI in forcing Microsoft to hand over data stored in Ireland

28
Q

Allowed the UK to seek data stored overseas as part of a criminal investigation

A

Overseas Production ACT (COPOA)