Udemy-Domain 7 Flashcards

1
Q

a chain of custody form would record the following 4 things:

A

Who handled the evidence
What they did with it
Where they had it
When they had it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a hard drive has ___ going around (like grooves in a vinyl record) and ___ going out from the center like pie slices. Where these intersect is called a ___ and groups of adjacent ones are called ___

A

tracks; sectors; track sectors; clusters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the 4 types of disk-based forensic data are

A

allocated space
unallocated space
slack space
bad blocks/clusters/sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network forensics can be of the first type where ___ and the second type where ___ which technically requires a search warrant or approval

A

we monitor traffic for anomalies;

data is reassembled from traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

collecting network data for forensics can either be ___, where the traffic is stored for later analysis, or ___, where each packet is analyzed in real-time, and only some is stored

A

catch if you can (requires more storage);

stop, look and listen (requires more processing power)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a security ___ triggers warnings if an ___ happens

A

alert; event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a security ___ consists of multiple adverse events happening on a system or network

A

incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the difference between a security incident and a security problem is that a problem ___

A

has an unknown cause and warrants more root cause analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a security ___ is a non-disruptive failure

A

inconvenience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a security ___ is urgent, an event with potential for loss of life or property

A

emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a ___ is an event that causes an entire facility to be unusable for 24 hours or longer

A

disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a ___ is an event that destroys a facility

A

catastrophe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a ___ port is configured to capture all the traffic on the network

A

SPAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

one advantage of HIDS over NIDS is that it can see the traffic ___

A

unencrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

one disadvantage of HIDS over NIDS is that some attacks can ___

A

disable a HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

disabling ports on a network workstation should be done from ___

A

active directory

17
Q

to ensure that ALL devices on a network are properly configured/hardened, use ___

A

OS images

18
Q

change management is ___, but change control is ___

A

the entire project of the change; the parts where we control the change

19
Q

one reason to exclude OS files from a backup is ___

A

to avoid backing up any rootkit programs

20
Q

one difference between incremental and differential backups is that ___ backups do not clear the archive bit

A

differential

21
Q

a copy backup is like a full backup, except ___

A

it doesn’t clear the archive bit

22
Q

___ refers to anything computer-related, but ___ refers to anything online

A

IT security; cyber-security

23
Q

a DRP has the 4 basic steps:

A
  1. Mitigation (reduce likelihood and impact)
  2. Preparation (Procedures, tools and training)
  3. Response
  4. Recovery (restore functionality/production)
24
Q

in Disaster Recovery the Recovery team gets an alternate site up and running (failover), starting with the most critical systems. The Salvage team ___ starting with ___

A

restores the original infrastructure (failback); the least critical systems (to ensure stability)

25
Q

in a ___, the disaster recovery plan is read by team members looking for glaring omissions or missing sections

A

DRP review

26
Q

in a ___ DRP review, managers go through the plan to see if they have all the components it calls for

A

read through (checklist)

27
Q

in a ___ DRP review, managers and critical personnel talk through each process, looking for gaps, omissions or technical inaccuracies

A

tabletop/structured talk/walkthrough

28
Q

in a ___ DRP review, the team simulates a disaster and personnel respond with their part

A

simulated test/walkthrough drill

29
Q

in a ___ DRP review, critical components are activated at a secondary site using backups, and compared with the primary system at the end of the day

A

parallel processing

30
Q

in a ___ DRP review, a single application is interrupted and failed over (after hours) to a secondary facility

A

partial Interruption

31
Q

in a ___ DRP review, all applications are interrupted and failed over (after hours) to a secondary facility

A

full interruption

32
Q

DRP plans should be reviewed and updated at least every ___ months

A

12

33
Q

after updating a DRP, all team members must ___

A

turn in their copies of the previous plan for destruction

34
Q

warm sites should take between ___ and ___ hours to become functional

A

4; 24

35
Q

a temporary command and control center during an emergency is called the ___

A

EOC (Emergency Operation Center)

36
Q

the digital forensics process has 4 steps:

A
  1. Identify potential evidence
  2. Acquire the evidence
  3. Analyze the evidence
  4. Report your findings