Response_Recovery_Flashcards

1
Q

What is evidence identification in digital crime scene analysis?

A

Evidence identification involves recognizing potential evidence in devices like mobile phones, computers, and network logs to prioritize data collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of digital forensics triage?

A

Digital forensics triage assesses each device to prioritize data collection, ensuring essential evidence is not overlooked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of evidence are crucial in cybercrime investigations?

A

Both digital and physical evidence, including emails, browser history, and data on external drives, are crucial in cybercrime investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the goal of search and seizure techniques in digital forensics?

A

Search and seizure techniques aim to secure devices and prevent data contamination during evidence collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are triage procedures in digital forensics?

A

Triage procedures include securing devices, such as placing them in airplane mode or using Faraday bags, to prevent network communication and preserve evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where are some possible sources of hidden digital evidence?

A

Hidden evidence may be found in routers, memory cards, and connected IoT devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the protocols for handling mobile devices in digital forensics?

A

Protocols involve securing mobile devices to avoid tampering and documenting passwords or patterns if available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the standard protocol for securing laptops and PCs?

A

It includes securing computers, noting connected external devices, and deciding whether to leave devices on to capture volatile memory data (RAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is cloud data challenging to collect in digital forensics?

A

Cloud-based data is hard to collect due to decentralized storage and reliance on service providers for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are best practices for preserving cloud data in digital forensics?

A

Best practices include creating forensic images, working with service providers, and preserving metadata associated with accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of digital forensic triage in evidence prioritization?

A

Digital forensic triage rapidly categorizes evidence, guiding the investigation and identifying sources needing immediate analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is rapid assessment important in digital forensic triage?

A

Rapid assessment is essential for efficiently handling large volumes of digital data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does MAC address identification aid in network evidence collection?

A

MAC address analysis helps investigators track device connections on networks, assisting in reconstructing event timelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can Wi-Fi networks and hotspots serve as evidence?

A

Wi-Fi data can reveal a suspect’s locations and movements, as devices connect to known networks automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly