Writing Assignment: Module 09 Flashcards

1
Q

What is an incident damage assessment?

A

The initial determination of the scope of the breach of confidentiality, integrity, and availability of information and information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the reasons a safeguard or control may not have been successful in stopping or limiting an incident?

A

Missing, Misconfigured, or Malfunctioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must be done with interrupted services during the recovery process?

A

Compromised services and processes must be examined, verified, and then restored. If services or processes were interrupted in the course of regaining control of the systems, they need to be brought back online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What procedures should occur on a regular basis to maintain the IR plan?

A

procedures to complete effective after-action review meetings, a process to complete comprehensive periodic plan review and maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is digital forensics?

A

the use of forensic techniques when the source of evidence is a digital electronic device, which includes computer systems, mobile phones, smartphones, tablets, portable music players, and all other electronic devices capable of storing digital information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What legal issues guide an organization in setting up a forensic capability?

A

Cost Response time, and Data Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do organizations often divide the practice of digital forensics?

A

First response and Analysis and Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the common roles and duties of a digital forensic first-response team?

A

Incident Manager, Scribe and Imager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What factors determine which digital evidence should be collected and in what order?

A

Value, Volatility, and Effort Required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In forensic analysis, what are the differences between examination and analysis?

A

involves the use of forensic tools to recover the content of files that were deleted, operating system artifacts (such as event data and logging of user actions), and other relevant facts.

uses those materials to answer the question(s) that gave rise to the investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of document is usually required when an organization other than a law enforcement agency obtains authorization for a search?

A

Warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what important way does search and seizure differ in the public and private sectors?

A

Private sector doesn’t have broad immunity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four steps in acquiring digital evidence?

A

Identify sources of evidentiary material.
Authenticate the evidentiary material.
Collect the evidentiary material.
Maintain a documented chain of custody..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What two hash functions are the most commonly used?

A

Message Digest (MD-5) and Secure Hash Algorithm (SHA-1, SHA-2, and SHA-3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of sterile media?

A

for evidence collection purpose. The evidence must not be tainted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of forensics is used for practices that continue to operate while being examined?

A

Live acquisition

17
Q

What types of information are missed by a normal copying process but included in a forensic image?

A

Deleted entries

18
Q

What is the relationship between forensics and anti-forensics, and why is it important to the forensics investigator?

A

involves an attempt made by those who may become subject to digital forensic techniques to obfuscate or hide items of evidentiary value. It’s recovery can pose significant threat

19
Q

Why is encryption a good thing for IT workers but bad for forensic investigators?

A

Encrypted information poses significant challenges to forensic investigators because, by its nature, encryption conceals the content of digital material.

20
Q

When is the involvement of law enforcement optional in a forensics investigation? Who should make this determination?

A

As long as the incident does not violate a civil or criminal law, it is optional. The CSIRT should make the ultimate decision.