Exam Review 2 Flashcards
What is the main goal of digital forensics?
To collect and protect information relating to an intrusion.
What does RFC 3227 provide guidelines for?
Evidence Collection and Archiving in digital forensics.
What is a legal hold in digital forensics?
A technique to preserve relevant information in preparation for impending litigation.
What is the purpose of capturing video in digital forensics?
To record events and gather information external to the computer and network.
What is important in maintaining a chain of custody for digital evidence?
Controlling evidence to maintain integrity and documenting everyone who contacts the evidence.
What does the term ‘admissibility’ refer to in digital forensics?
The acceptability of data as evidence in a court of law.
How is time offset important in digital forensics?
It helps to accurately interpret the timestamps of data collected from different file systems.
Why are event logs significant in digital forensics?
They document important operating system and application events for future reference.
How are network infrastructure devices secured?
Through configurations like authentication settings, security updates, and access limitations.
What is the standard process for digital forensics?
Acquisition, analysis, and reporting of digital evidence.
Why is operating system hardening important?
To secure the OS through updates, user account management, and network security measures.
What is the purpose of application server hardening?
To secure programming languages and runtime libraries, disable unnecessary services, and apply security patches.
What does the ISO/IEC 27001 framework focus on?
Information Security Management Systems.
What is SSAE SOC 2 Type I/II in security standards?
An auditing standard for evaluating security controls like firewalls and intrusion detection.
What is PCI DSS in security standards?
Payment Card Industry Data Security Standard, a standard for protecting credit card information.
What role do deterrent controls play in security?
They discourage intrusion attempts without directly preventing access.