IS3440 CHAP 14 DETECTING AND RESPONDING TO SECURITY BREACHES Flashcards
COMMAND ___ is known as the disk dump command, it supports a full copy of all data on a partition, volume, or drive.
dd
COMMAND ___ is a variation on the dd command that reads data from back to front on a specified partition, volume, or drive. It is more error tolerant than dd.
dd_rescue
COMMAND ___ is a command that lists libraries used by a specified command; its use requires the full path to the target command.
ldd
COMMAND ___ is a file that dynamically represents the contents of RAM on the local system.
/proc/kcore
COMMAND ___ is a command that synchronizes files from one location to another; may be used in conjunction with SSH.
rsync
COMMAND ___ is a command that traces the system calls used by another command; primarily used for troubleshooting.
strace
COMMAND ___ is a package that tracks the RAM and CPU usage on a system, with the help of the ‘cron’ service.
sysstat
COMMAND ___ is a command that lists currently logged in users and the process currently being run by that user.
w
COMMAND ___ is a command that lists currently logged in users.
who
___ is an abbreviation for Computer Aided Investigative Environment, a bootable live CD distribution available from http://caine-live.net/.
CAINE
___ is built on Ubuntu Linux. It includes a number of live tools for recovering data from live Microsoft operating systems available.
DEFT
___ is a live CD distribution that incorporates the tools associated with the Sleuth Kit.
Master Key Linux
___ is a system for bug reports on Red Hat distributions.
Red Hat Bugzilla
___ is a package of tools that can be used to save volatile data; intended for use on read-only media as commands on compromised systems.
Sleuth Ket
- Which of the following COMMANDS can display the free memory in RAM and in a swap partition? (Select two)
- free
- mem
- top
- swapon
free
top
- It is important to have a security policy that applies to users for how they do their backups.
TRUE OR FALSE
FALSE
- What command reads log files created through the system status tool?
sar
- Which of the following COMMANDS is used to identify users who have since logged out?
- who
- w
- last
- sar
last
- Which of the following file extensions is NOT associated with software packages?
- .odt
- .tar.gz
- .rpm
- .deb
.odt
- Which of the following is most important to recover from a compromised system before powering it down?
- /home/
- /etc/fstab
- /proc/kcore
- None of the above
/proc/kcore
- Which of the following FILES is most likely to change when a system is powered down?
- /etc/mtab
- /etc/fstab
- /etc/boot/grub/menu.1st
- /etc/crontab
/etc/mtab
- which of the following COMMANDS is least useful for recovering data from a live system?
- nc
- vi
- dmesg
- cat
vi
- What command can be used to duplicate the contents of a partition by its device file?
dd
- Which of the following COMMANDS is NOT associated with compiling the source code associated with other commands?
- config
- configure
- make install
- make
config
11, Which of the following actions is normally done from a forensic operating system booted from live media, when connected to a compromised hard drive?
- Recovering information from RAM
- Making a copy of the /proc/kcore file
- Recovering information from a swap partition
- Copying the contents of /etc/mtab
Recovering information from a swap partition
- Which of the following commands does NOT include free space in the duplication process?
- rsync
- dd
- dd_rescue
- icat
rsync
- Which of the following steps is NOT appropriate when saving compromised data from a hard drive?
- Keeping a compromised system connected to a network during an investigation
- Taking special care to avoid overwriting data in a swap partition
- Booting a live Knoppix CD distribution
- Powering down a compromised system after saving dynamic data
Booting a live Knoppix CD distribution
- Which of the following steps should you take if you’ve identified a new security problem with open source software?
- Share the concern on a standard mailing list for the distribution
- Share the concern on a standard mailing list for the compromised software
- Communicate privately with the developers of the compromised software
- Nothing, as it is important to protect proprietary information in the open source community
Communicate privately with the developers of the compromised software