Set 3 Flashcards

1
Q

Which areas of a windows host should you focus on investigating for windows information?

A

Registry, event logs, memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Running commands on a suspects windows system, what is the best practice?

A

Run windows commands from a USB drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Out of these what would not be considered volatile evidence?
Open shares and files
Running processes
Network connections
Shadow volume copies

A

Shadow volume copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where to collect windows based tool?

A

Windows system control center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command would a forensics analyst use to determine what processes are running on windows based system?

A

Tasklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which command would be used to list active network connections?

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does this command do?
Net users&raquo_space; output.txt

A

Appends the information to a txt file.
» always has something to do with append

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Juanita is performing windows laptop search, consent and search and seizure form, wants to make a copy of the contents of physical memory of the host, what does she use?

A

Dumpit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Forensic analyst on windows host, a registry key shows ClearpagefileatShutdown, what does this mean?

A

No virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which registry hive is populated once the user logs in?

A

current user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is not considered a main give of registry?

A

Config update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Metadata is encrypted and hidden in a different file, True or false

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows based laptop investigation, suspect may have installed malware on purpose, to confirm John runs in vm, what analysis is this?

A

Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which area is best for investigation for users suspicious internet related activities?

A

Browser cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In an investigation Liv uses volatility, employee wont give password, she tries every possible password to enter computer, what method is this called?

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During data investigation, aleta uses volatility, employee wont give password, what is a hydra tool used to get passwords?

A

Word list

17
Q

What are volatility modules?

A

Hive list, image info, system info, hash dump

18
Q

Which tool can be used to analyze hard drive images on linux, windows, mac?

A

Autopsy

19
Q

One TB in size analysis, how much space should she have?

A

Three terabytes

20
Q

Which soft skill is important to being important to being a data forensic analyst?

A

attention to detail

21
Q

What password hash is considered the strongest?

A

SHA256

22
Q

What nist program must verify tools?

A

CFTT computer forensics tools testing

23
Q

Know what classifies as hardware

A

You should know this

24
Q

Osi layer that routes traffic between ip hosts?

A

Layer 3 network layer

25
Q

Tcp and udp operate at which level of the OSI?

A

Transport layer

26
Q

Trivial FTP is _____

A

UDP

27
Q

What port is associated with websites HTTPS?

A

443 tcp

28
Q

85% of internet traffic is encrypted, why is this?

A

Due to intrusion detection

29
Q

Which can be reviewed on a host to determine what other hosts have communicated with it?

A

ARP address resolution protocol

30
Q

Wireshark three way handshake?

A

SYN > SYN, ACK > ACK

31
Q

Which tool is used to view an output of active connections?

A

netstat

32
Q

Which exe is associated with a specific process number?

A

PID

33
Q

Greg is apart of information security team, server problem, greg does network tap, he enables what mode to see traffic?

A

Promiscuous

34
Q

Attacker deletes an event log how do you know?

A

Centralized logs

35
Q

Sending an event log to another host?

A

Udp 514, windows event forwarding

36
Q

Blank protocol is used to synchronize?

A

Network time protocol NTP

37
Q

Qraar or Splunk is only able to collect event logs form firewalls, as many firewalls as its licensed for? True or false

A

false

38
Q

5 different parts of the network tuple?

A

source IP, source port, destination IP, destination port, and the protocol.