Network Forensics Flashcards

1
Q

The process of capturing, recording, and analyzing network events to discover the source of security incidents.

A

Network forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A detailed copy of all packets transferred across a network used for forensic analysis.

A

Packet capture (PCAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A tool used for capturing and analyzing live network traffic at the packet level.

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of reviewing and interpreting traffic after it has been recorded.

A

Offline network traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A log that summarizes communication between devices by showing IPs, ports, byte counts, and durations.

A

NetFlow log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A forensic approach that identifies anomalies in the volume or direction of network traffic.

A

Traffic pattern analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The technique of tracing traffic to its origin by following packet paths across devices.

A

Network trace route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A protocol analyzer that provides low-level details of network communications.

A

Packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term for a complete, raw copy of all traffic on a network segment.

A

Full packet capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of capture that records only metadata (e.g., headers), not the packet payload.

A

Header capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The practice of examining DNS logs to identify malicious domain queries.

A

DNS forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A tool that provides behavioral alerts by comparing traffic against a baseline.

A

Anomaly-based NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system that passively monitors network traffic for signs of suspicious activity.

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network-based system that can block malicious traffic in real time.

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of identifying and reconstructing application-level content from packet captures.

A

Protocol decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A system used to correlate logs from various sources including firewalls, routers, and endpoints.

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The type of evidence that network logs and PCAPs represent in a legal investigation.

A

Digital evidence

18
Q

A key principle that ensures evidence is not altered during analysis.

A

Chain of custody

19
Q

The term for viewing sessions and conversations in order to reconstruct attacker activity.

A

Session reconstruction

20
Q

A traffic type that is considered a red flag in network forensics when using unusual ports.

A

Protocol misuse

21
Q

The process of extracting files or payloads from network packet captures.

A

Data carving

22
Q

Logs generated by security appliances such as firewalls, routers, and proxies.

A

Perimeter device logs

23
Q

A source of logs that show connection attempts and traffic direction between hosts.

A

Firewall logs

24
Q

Logs that help identify abnormal login times, failed attempts, or session hijacking.

A

Authentication logs

25
Q

A file type commonly used to store and share captured packets.

A

.pcap file

26
Q

A method used to identify large data transfers that could indicate exfiltration.

A

Bandwidth analysis

27
Q

The practice of matching a known IOC (IP, hash, domain) with traffic data.

A

Threat intelligence correlation

28
Q

The challenge of analyzing encrypted traffic without visibility into payloads.

A

TLS/SSL inspection limitation

29
Q

A tool or device that duplicates traffic to a separate monitoring port for analysis.

A

Network TAP (Test Access Point)

29
Q

The area where logs are centralized and archived for long-term forensic review.

A

Log aggregation platform

30
Q

The ability to identify who performed an action and when, using network logs.

A

Attribution

31
Q

Technique used to detect traffic going to known C2 infrastructure.

A

C2 beacon detection

32
Q

Evidence of periodic, consistent external connections from infected hosts.

A

Beaconing behavior

33
Q

A sign of internal scanning where one host sends SYN packets to multiple internal devices.

A

Lateral movement attempt

34
Q

Log evidence showing repeated connection attempts to a closed port.

A

Port scanning

35
Q

Protocol often analyzed in forensics to find user credentials or commands in plaintext.

A

FTP or Telnet

36
Q

A forensic red flag when a non-web protocol runs over port 80 or 443.

A

Protocol tunneling

37
Q

Activity showing large outbound traffic to an unusual country or IP.

A

Data exfiltration

38
Q

A timeline of network events that correlates attacker behavior across systems.

A

Incident timeline reconstruction

39
Q

The final step of a forensic investigation where a report is delivered to stakeholders.

A

Findings documentation