Kahoot Review Flashcards

1
Q

Responsibility for strategy, data, IT asset

A

CISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Blocklist filtering, Host Isolation, Segementation

A

Cybersecurity Incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pen test is part of DFIR

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tools for Data Carving

A

PhotoRec, HxD, Bulk Extractor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preparation and Planning, Detection and Analysis, Containment, Eradication, Recovery, and Post Incident

A

NIST Incident Response method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

you can replace network traffic with Wireshark

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Volatility Tool

A

Memory Inspection Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

File System changes, Network Activity, Registry changes should be monitored during malware analysis

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should you use to test malware in an isolated environment/

A

Sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wireshark is , tcpdump is

A

GUI, CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Autoruns tool is

A

Find persistent malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Registry keys, Services, Schedule

A

Malware persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows Event Viewer include Alert, Error, Debug

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does UPX do?

A

Obfuscate Malware code (Ultimate Packer for Executables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hiding a file within a file is

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does FTK imager do

A

clone a drive

17
Q

when data is erased it stays on HDD until overwritten

A

True

18
Q

File System EXT4

A

Linux

19
Q

What are ARM, MIPS, NASM?

A

CPU architecture

20
Q

What does Debugger do

A

debugs code investigate malware