Kahoot Review Flashcards
Responsibility for strategy, data, IT asset
CISO
Blocklist filtering, Host Isolation, Segementation
Cybersecurity Incidents
Pen test is part of DFIR
False
Tools for Data Carving
PhotoRec, HxD, Bulk Extractor
Preparation and Planning, Detection and Analysis, Containment, Eradication, Recovery, and Post Incident
NIST Incident Response method
you can replace network traffic with Wireshark
False
Volatility Tool
Memory Inspection Tool
File System changes, Network Activity, Registry changes should be monitored during malware analysis
True
What should you use to test malware in an isolated environment/
Sandbox
Wireshark is , tcpdump is
GUI, CLI
Autoruns tool is
Find persistent malware
Registry keys, Services, Schedule
Malware persistence
Windows Event Viewer include Alert, Error, Debug
True
What does UPX do?
Obfuscate Malware code (Ultimate Packer for Executables
Hiding a file within a file is
Steganography