QUIZ SUMMARIZE Flashcards

1
Q

Best Description for Write Blocker

A

A tool designed to prevent any write access to hard disk, permitting read-only access to data storage without compromising the integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What access control models will allow the access to view Top Secret files?

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM systems provide what capability to users?

A
  1. Single sign-on
  2. Two-factor authentication
  3. Privileged access management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bit Stream Copy

A
  1. A copy of the original storage medium
  2. Also known as Bit Stream Image
  3. Exact copy of the original disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discretionary Access Control (DAC)

A
  1. Owners can usually modify object ACLS
  2. Control accessed through Asset Control Lists(ACL)
  3. Owner can place subject on ACL or not
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mandatory Access Control (MAC)

A
  1. Allows end-user to decide who get access to info
  2. Doesn’t allow user to give other users privilege access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two types of evidence extractions

A
  1. Logical Extraction
  2. Physical Extraction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Hash Value do

A

Used to determine the integrity of data to verify a forensic image was captured successfully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Chain of Custody?

A

The sequential documentation that accounts for the sequence of custody, control, transfer, analysis, and disposition of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logical Extraction

A

Examining file system information: file name, size, location, attributes, data and time stamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What tool is needed for DATA RECOVERY

A

Recuva

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Collection method that is most likely to be accepted in a court case

A

Provide a mirror image of a hard drive such as disk management tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Example of an Intruder attack

A

Performing a remote root compromise of an email server, defacing a web server, guessing and cracking passwords, viewing private info without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What entity is responsible for potentially affecting an organisation’s security

A
  1. Threat Actors
  2. Malicious Actors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is watering hole?

A

a form of cyberattack that targets groups of users by infecting websites that they commonly visit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital Evidence can be grouped as these categories:

A

User Created
Computer Created
User Protected

17
Q

Types of Digital Evidence

A

Logs.
Video Footage and Images.
Archives.
Active Data.
Metadata.
Residual Data.
Volatile Data.
Replicant Data.

18
Q

Most dangerous Threat Actors

A

Nation States

19
Q

Phishing, baiting, smishing, , malware, pretexting, and water-holing are examples of?

A

Social Engineering

20
Q

Message Digest

A

Create a message digest or “fingerprint”

21
Q

Chain of custody definition

A

CoC indicates the collection, sequence of control, transfer, and analysis. It also documents each person who handled the evidence, the date/time it was collected or transferred, and the purpose for the transfer.

22
Q

What would be the best email for Susan?

A

.Sus@n53

23
Q

Symmetric encryption is known as?

A

“secret key” encryption: the key must be kept secret from third parties.

24
Q

Asymmetric encryption is known as?

A

Public key encryption