Udemy-Domain 7 Flashcards
a chain of custody form would record the following 4 things:
Who handled the evidence
What they did with it
Where they had it
When they had it
a hard drive has ___ going around (like grooves in a vinyl record) and ___ going out from the center like pie slices. Where these intersect is called a ___ and groups of adjacent ones are called ___
tracks; sectors; track sectors; clusters
the 4 types of disk-based forensic data are
allocated space
unallocated space
slack space
bad blocks/clusters/sectors
Network forensics can be of the first type where ___ and the second type where ___ which technically requires a search warrant or approval
we monitor traffic for anomalies;
data is reassembled from traffic
collecting network data for forensics can either be ___, where the traffic is stored for later analysis, or ___, where each packet is analyzed in real-time, and only some is stored
catch if you can (requires more storage);
stop, look and listen (requires more processing power)
a security ___ triggers warnings if an ___ happens
alert; event
a security ___ consists of multiple adverse events happening on a system or network
incident
the difference between a security incident and a security problem is that a problem ___
has an unknown cause and warrants more root cause analysis
a security ___ is a non-disruptive failure
inconvenience
a security ___ is urgent, an event with potential for loss of life or property
emergency
a ___ is an event that causes an entire facility to be unusable for 24 hours or longer
disaster
a ___ is an event that destroys a facility
catastrophe
a ___ port is configured to capture all the traffic on the network
SPAN
one advantage of HIDS over NIDS is that it can see the traffic ___
unencrypted
one disadvantage of HIDS over NIDS is that some attacks can ___
disable a HIDS
disabling ports on a network workstation should be done from ___
active directory
to ensure that ALL devices on a network are properly configured/hardened, use ___
OS images
change management is ___, but change control is ___
the entire project of the change; the parts where we control the change
one reason to exclude OS files from a backup is ___
to avoid backing up any rootkit programs
one difference between incremental and differential backups is that ___ backups do not clear the archive bit
differential
a copy backup is like a full backup, except ___
it doesn’t clear the archive bit
___ refers to anything computer-related, but ___ refers to anything online
IT security; cyber-security
a DRP has the 4 basic steps:
- Mitigation (reduce likelihood and impact)
- Preparation (Procedures, tools and training)
- Response
- Recovery (restore functionality/production)
in Disaster Recovery the Recovery team gets an alternate site up and running (failover), starting with the most critical systems. The Salvage team ___ starting with ___
restores the original infrastructure (failback); the least critical systems (to ensure stability)
in a ___, the disaster recovery plan is read by team members looking for glaring omissions or missing sections
DRP review
in a ___ DRP review, managers go through the plan to see if they have all the components it calls for
read through (checklist)
in a ___ DRP review, managers and critical personnel talk through each process, looking for gaps, omissions or technical inaccuracies
tabletop/structured talk/walkthrough
in a ___ DRP review, the team simulates a disaster and personnel respond with their part
simulated test/walkthrough drill
in a ___ DRP review, critical components are activated at a secondary site using backups, and compared with the primary system at the end of the day
parallel processing
in a ___ DRP review, a single application is interrupted and failed over (after hours) to a secondary facility
partial Interruption
in a ___ DRP review, all applications are interrupted and failed over (after hours) to a secondary facility
full interruption
DRP plans should be reviewed and updated at least every ___ months
12
after updating a DRP, all team members must ___
turn in their copies of the previous plan for destruction
warm sites should take between ___ and ___ hours to become functional
4; 24
a temporary command and control center during an emergency is called the ___
EOC (Emergency Operation Center)
the digital forensics process has 4 steps:
- Identify potential evidence
- Acquire the evidence
- Analyze the evidence
- Report your findings