verified answers
6 Stages of Forensics Examination - Analysis Ans✓✓✓-Involves use of appropriate
tools needed to provide thorough and repeatable analysis of the compromised
system.
6 Stages of Forensics Examination - Collecting Ans✓✓✓-Involves collecting
evidence and interviewing relevant IT personnel as well as the IT administration
responsible for the affect system.
6 Stages of Forensics Examination - Evaluation Ans✓✓✓-Includes receiving
instructions, clarifying instructions, completing risk analysis, and allocating
resources.
6 Stages of Forensics Examination - Presentation Ans✓✓✓-Examiner provides a
structured report on findings during the examination. Includes addressing key
points and any additional information relevant to the investigation.
6 Stages of Forensics Examination - Readiness Ans✓✓✓-Includes appropriate
training, regular testing, and verification of software and equipment, familiarity
with legislation, and ensuring that the onsite acquisition (data extraction) kit is
complete and in working order.
6 Stages of Forensics Examination - Review Ans✓✓✓-The examiner should
review what went wrong, what was done properly, and what can be learned and
improved on based on this incident.
, 6 Stages of Forensics Examination Ans✓✓✓-Readiness, Evaluation, Collection,
Analysis, Presentation, Review.
Acceptable Use Policy (AUP) Ans✓✓✓-Defines the constraints and practices the
user must agree to in order to have access to the network.
Access Lists (ACLs) Ans✓✓✓-Basic form of firewall protection, but by itself is not
a firewall. Consists of permit and deny statements to control traffic in and out of
the network interface.
access-list permit ip any any Ans✓✓✓-Instruction added to the last line of an
access list to allow all other data packets to enter and exit the router.
Antivirus Software Ans✓✓✓-By using a list of known malware
signatures/definitions, keeps viruses, worms, and general malware away. Must be
up to date to keep up with new virus signatures.
Best way to stop DDoS attacks? Ans✓✓✓-PREVENT INTRUSIONS in the first place.
Brute Force Attack Ans✓✓✓-Uses every possible combination of characters for
the password.
Buffer Overflow Ans✓✓✓-Happens when a program tries to put more data into a
buffer than it was configured to hold.
CCMP Ans✓✓✓-Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol