Incident Response Management Techniques Flashcards

1
Q

Splunk is a software that is used for monitoring and analyzing data. Which Splunk application is used to collect logs for analysis?
A. Splunk Enterprise
B. Splunk Receiver
C. Splunk Log Collector
D. Splunk Universal Forwarder

A

A. Splunk Enterprise
The Splunk Enterprise application serves as a log collector. The Splunk Universal Forwarder is installed on network devices and forwards logs to Splunk Enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Windows Application is configured to allow forwarded log packets to be received by the Splunk Enterprise host?
A. Event viewer
B. Defender
C. Group Policy
D. Task Manager

A

B. Defender
A rule in the Windows Defender Firewall is configured to allow packets from the log forwarder to the machine hosting the Splunk Enterprise application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of using hashing algorithms when creating a forensic image of a data source?
A. Availability
B. Integrity
C. Accounting
D. Confidentiality

A

B. Integrity
Hashes are used in the forensic copying process to guarantee the integrity of the data, i.e., to ensure an exact copy is made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of making the forensic copy a read-only copy?
A. The forensic copy should not be read-only
B. Ensures the confidentiality of the data source
C. Ensures that forensic analysis cannot affect/modify the data being analyzed
D. Confirms the non-repudiation of the forensic analyst

A

C. Ensures that forensic analysis cannot affect/modify the data being analyzed
Ensuring the forensic copy is read-only ensures that the forensic analysis cannot affect/modify the data being analyzed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly