Digital Forensics Flashcards

1
Q

The application of investigation and analysis techniques to gather and preserve evidence from digital sources.

A

Digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The formal documentation that proves evidence has not been altered and was handled properly.

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A hash value used to verify the integrity of forensic images and data.

A

MD5 or SHA-1 hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Making an exact, bit-for-bit copy of a digital device for forensic analysis.

A

Imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The first response step in forensics to ensure systems are not tampered with.

A

Evidence preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The safest type of imaging that doesn’t modify the original data.

A

Write-blocked imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A forensic action used to reconstruct attacker activity from logs or memory.

A

Timeline analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A forensic process that recovers deleted or fragmented data.

A

File carving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A temporary, volatile data source that must be captured before shutting down a system.

A

RAM (volatile memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The stage in digital forensics where collected data is reviewed for evidence.

A

Examination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of documenting forensic findings and presenting them clearly to stakeholders.

A

Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A live forensic technique used to collect data from a system while it’s running.

A

Volatile data acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tool used to analyze disk images and file systems in forensic investigations.

A

Autopsy or FTK Imager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The final phase of the forensic process where lessons learned are shared.

A

Post-incident review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The type of forensics used to investigate suspicious behavior within logs and event files.

A

Log forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An incident type requiring forensics when intellectual property is stolen.

A

Data breach investigation

17
Q

The standard order of volatility when collecting evidence.

A

CPU cache → RAM → disk → backups

18
Q

A location in digital forensics where original evidence is securely stored.

A

Evidence locker

19
Q

Forensic technique used to analyze unallocated disk space.

A

Slack space analysis

20
Q

Temporary storage space that may hold valuable artifacts like passwords or recent files.

A

Pagefile or swap file

21
Q

The process of examining running processes, open connections, and system artifacts on live systems.

A

Live forensics

22
Q

A type of tool that helps identify who accessed what file and when.

A

File access audit tool

23
Q

The forensic process of validating that the evidence matches what was originally acquired.

A

Integrity check

24
Q

The device used to prevent modification during forensic acquisition.

A

Hardware write blocker

25
Q

The practice of isolating systems to prevent tampering during forensic review.

A

Evidence containment

26
Q

A tool used to extract browser history, cookies, and cache during investigations.

A

Internet Evidence Finder (IEF)

27
Q

Artifacts like shellbags, prefetch files, and jump lists are found in what system?

A

Windows OS

28
Q

A standard forensic format used to store disk images.

A

E01 format

29
Q

The forensic method used to understand what was done on a device without directly examining it.

A

Artifact analysis

30
Q

A structured process for identifying, collecting, analyzing, and preserving digital evidence.

A

Forensic investigation lifecycle