IS4670 Chapter 12 Searching Memory in Real Time with Live System Forensics Flashcards
1
Q
- ________ is analysis of machines that remain in operation as you examine them.
A
Live system forensics
2
Q
- ________ is analysis of machines that have been shut down.
A
Dead system analysis
3
Q
- It is not as important to avoid contaminating evidence in live system forensics as it is in dead system forensics.
A. True
B. False
A
FALSE
4
Q
- Which of the following are drawbacks of dead system forensics? (Select three.)
A. It leads to corruption of evidence.
B. It leads to corruption of the original data.
C. It leads to system downtime.
D. It leads criminals to use cryptography.
E. It leads to data consistency problems.
A
It leads to corruption of evidence.
It leads to system downtime.
It leads criminals to use cryptography.
5
Q
5. You can use live system forensics to acquire one type of data that dead system forensics can’t acquire. What type of data is this? A. Binary B. Virtual C. Volatile D. Nonvolatile
A
Volatile
6
Q
6. Which of the following is a software implemen- tation of a computer that executes programs as if it were a physical computer? A. VMware B. Write blocker C. Hardware fingerprint D. Virtual machine
A
Virtual machine
7
Q
- Which of the following are drawbacks of live system forensics? (Select three.)
A. It leads to system downtime.
B. Slurred images can result.
C. Data can be modified
D. It leads to data consistency problems.
E. It leads criminals to use cryptography.
A
Slurred images can result.
Data can be modified
It leads to data consistency problems.
8
Q
- As a result of not acquiring data at a unified moment, live system forensics presents a problem with ________.
A
Consistency
9
Q
9. What are two possible techniques for approaching a compromised system using live system forensics? (Select two.) A. Live response B. Hot swapping C. Volatile memory analysis D. Hardware fingerprinting
A
Live response
Volatile memory analysis
10
Q
- The following are some of the benefits of ________: It limits the impact on the compromised system, analysis is repeatable, and you can ask new questions after the analysis.
A
Volatile memory analysis