100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Forensics and Network Intrusion- Exam Questions Answered Correctly Latest Version 2024

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
27-12-2024
Written in
2024/2025

Forensics and Network Intrusion- Exam Questions Answered Correctly Latest Version 2024 Which web application weakness allows sensitive data to be unintentionally revealed to an unauthorized user? - Answers Information Leakage Which situation leads to a civil investigation? - Answers Disputes between two parties that relate to a contract violation What is a benefit of forensic readiness? - Answers Establishes procedures for fast and efficient investigations What should be considered when creating a forensic readiness plan? - Answers Source of the evidence Which rule does a forensic investigator need to follow? - Answers Use well-known standard procedures What is the focus of Locard's exchange principle? - Answers Anyone entering a crime scene takes something with them and leaves something behind. What is the focus of the enterprise theory of investigation (ETI)? - Answers Solving one crime can tie it back to a criminal organization's activities What allows for a lawful search to be conducted without a warrant or probable cause? - Answers Consent of person with authority A forensic investigator is tasked with retrieving evidence where the primary server has been erased. The investigator needs to rely on network logs and backup tapes to base their conclusions on while testifying in court. Which information found in rules of evidence, Rule 1001, helps determine if this testimony is acceptable to the court? - Answers Definition of original evidence When can a forensic investigator collect evidence without formal consent? - Answers When properly worded banners are displayed on the computer screen What do some states require before beginning a forensic investigation? - Answers License Which law protects customers' sensitive data by requiring financial institutions to inform their customers of their information-sharing practices? - Answers Gramm-Leach-Bliley Act (GLBA) Who determines whether a forensic investigation should take place if a situation is undocumented in the standard operating procedures? - Answers Decision Maker What should a forensic lab do to maintain quality assurance during a digital forensic investigation? - Answers Conduct validity testing on the tools What is a common task of a computer forensic investigator? - Answers Recovering deleted files, hidden files, and temporary data that could be used as evidence What is the process of live data acquisition? - Answers Acquiring volatile data from a working system What is the least volatile source of information when collecting evidence? - Answers DVD-ROM What is the type of analysis that a forensic investigator performs when running an application in a sandbox environment? - Answers Dynamic Which documentation should a forensic examiner prepare prior to a dynamic analysis? - Answers The full path and location of the file being investigated Which type of information can a forensic investigator find in a common metadata field for a file? - Answers Network name What is a forensic investigator analyzing when looking at the /var/log/ from a Mac? - Answers Applications that stop working A forensic investigator is tasked with finding out if a suspect recently accessed a specific folder on a network. Which registry key should the investigator analyze to retrieve only the folder information? - Answers BagMRU Which category of storage systems is characterized as being an independent node having its own IP address? - Answers Network-Attached Storage (NAS) What is an example of volatile data? - Answers Command history Where can evidence be found on routers? - Answers Configuration files What is a characteristic of Unicode UTF-32? - Answers Fixed-Width Encoding What is 4DD hexadecimal notation in binary? - Answers A forensic investigator is using a hex editor to view file signatures for graphics. Which type of file is the investigator viewing when the first hexadecimal characters are 42 4D? - Answers BMP What is the maximum compression ratio for JPEG files? - Answers 90% Where does MySQL - Answers Information Schema Which file is the repository for records in MSSQL? - Answers Primary data file (MDF) Which software tool is designed strictly for maintaining the integrity of evidence during data acquisition? - Answers SAFE Block Which media sanitization method does the NIST SP 800-88 recommend for making recovery infeasible while still allowing the media to be reused? - Answers Purge What is a Russian standard for media sanitizing? - Answers GOST P50739-95 What is the goal of anti-forensics? - Answers Interrupt and prevent information collection What directly stores the deleted files from a Windows Vista machine? - Answers C:$Recycle.Bin A forensic investigator is searching a Windows XP computer image for information about a deleted Word document. The investigator already viewed the sixth file that was deleted from the computer. Two additional files were deleted. What is the name of the last file the investigator opens? - Answers $R Which process studies system changes after multiple actions occur? - Answers Host integrity monitoring Which type of document could an investigator analyze using the Python-based tool oleid? - Answers Microsoft Word Which application should be used for file carving on Windows? - Answers R-Studio Which application should a forensic investigator use to analyze information on a Mac OSX? - Answers Data Rescue 4 A forensic investigator is collecting evidence from the database built into the Windows network operating systems. The investigator needs to verify the privileges of the database by using one of the MySQL utility programs. Which utility program should the investigator use? - Answers mysqlaccess A forensic investigator is collecting evidence from the MySQL server. The investigator needs to verify the status of the tables and repair them using one the MySQL utility programs. Which utility program should the investigator use? - Answers Myisamchk

Show more Read less
Institution
Forensics And Network Intrusion
Course
Forensics and Network Intrusion









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Forensics and Network Intrusion
Course
Forensics and Network Intrusion

Document information

Uploaded on
December 27, 2024
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Forensics and Network Intrusion- Exam Questions Answered Correctly Latest Version 2024

Which web application weakness allows sensitive data to be unintentionally revealed to an unauthorized
user? - Answers Information Leakage

Which situation leads to a civil investigation? - Answers Disputes between two parties that relate to a
contract violation

What is a benefit of forensic readiness? - Answers Establishes procedures for fast and efficient
investigations

What should be considered when creating a forensic readiness plan? - Answers Source of the evidence

Which rule does a forensic investigator need to follow? - Answers Use well-known standard procedures

What is the focus of Locard's exchange principle? - Answers Anyone entering a crime scene takes
something with them and leaves something behind.

What is the focus of the enterprise theory of investigation (ETI)? - Answers Solving one crime can tie it
back to a criminal organization's activities

What allows for a lawful search to be conducted without a warrant or probable cause? - Answers
Consent of person with authority

A forensic investigator is tasked with retrieving evidence where the primary server has been erased. The
investigator needs to rely on network logs and backup tapes to base their conclusions on while testifying
in court.



Which information found in rules of evidence, Rule 1001, helps determine if this testimony is acceptable
to the court? - Answers Definition of original evidence

When can a forensic investigator collect evidence without formal consent? - Answers When properly
worded banners are displayed on the computer screen

What do some states require before beginning a forensic investigation? - Answers License

Which law protects customers' sensitive data by requiring financial institutions to inform their
customers of their information-sharing practices? - Answers Gramm-Leach-Bliley Act (GLBA)

Who determines whether a forensic investigation should take place if a situation is undocumented in
the standard operating procedures? - Answers Decision Maker

What should a forensic lab do to maintain quality assurance during a digital forensic investigation? -
Answers Conduct validity testing on the tools

, What is a common task of a computer forensic investigator? - Answers Recovering deleted files, hidden
files, and temporary data that could be used as evidence

What is the process of live data acquisition? - Answers Acquiring volatile data from a working system

What is the least volatile source of information when collecting evidence? - Answers DVD-ROM

What is the type of analysis that a forensic investigator performs when running an application in a
sandbox environment? - Answers Dynamic

Which documentation should a forensic examiner prepare prior to a dynamic analysis? - Answers The
full path and location of the file being investigated

Which type of information can a forensic investigator find in a common metadata field for a file? -
Answers Network name

What is a forensic investigator analyzing when looking at the /var/log/crashreporter.log from a Mac? -
Answers Applications that stop working

A forensic investigator is tasked with finding out if a suspect recently accessed a specific folder on a
network. Which registry key should the investigator analyze to retrieve only the folder information? -
Answers BagMRU

Which category of storage systems is characterized as being an independent node having its own IP
address? - Answers Network-Attached Storage (NAS)

What is an example of volatile data? - Answers Command history

Where can evidence be found on routers? - Answers Configuration files

What is a characteristic of Unicode UTF-32? - Answers Fixed-Width Encoding

What is 4DD hexadecimal notation in binary? - Answers 10011011101

A forensic investigator is using a hex editor to view file signatures for graphics.



Which type of file is the investigator viewing when the first hexadecimal characters are 42 4D? - Answers
BMP

What is the maximum compression ratio for JPEG files? - Answers 90%

Where does MySQL - Answers Information Schema

Which file is the repository for records in MSSQL? - Answers Primary data file (MDF)

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
332
Member since
1 year
Number of followers
16
Documents
28211
Last sold
1 day ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions