100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SANS 500 Exam Study Guide Questions with Correct Answers 2025

Rating
-
Sold
-
Pages
16
Grade
A
Uploaded on
11-03-2025
Written in
2024/2025

Alternate Data Streams (ADS) -Correct Answer Alternative content for a file that exists by creating additional data pointers within the same NTFS file. Basically the presence of a second or subsequent data stream. Zone.Identifier is an example of an ADS. AMCACHE.HVE -Correct Answer Utilized for the internal application compatibility capability that allows for Windows to run older executables found from earlier iterations of their OS. AppCompatCache -Correct Answer Tracks the executable file's last modification date, file path, and if it was executed. Windows looks at this key to figure out if a program needs shimming for compatibility. AppData Folder -Correct Answer Contains custom settings and other information needed by applications. Contains your Local, LocalLow, Roaming folders. For example, Web browser bookmarks and cache. AppID -Correct Answer Each application has a unique id, but they are not unique to the system. Used to ensure that the application's preferences are not going to conflict with similar applications. Used in jumplists, in both Custom and Automatic. Application Log -Correct Answer Records events logged by applications. ex: failure of MS SQL to access a database Audit Removable Storage -Correct Answer Logs every interaction with removable device by user. Automatic Destinations -Correct Answer Contains a list of application sorted by AppID. Can be used to map the history of the application from its first use. Autostart -Correct Answer Lists the programs that run at system boot. Useful to find malware on a machine that installs on boot, such as a rootkit. Background Activity Monitor (BAM) -Correct Answer This key is used in conjunction with the DAM key to record the path of the executable and the last date/time executed. BagMRU -Correct Answer Based on the keys that are here, you can tell which directories were opened/closed during a time period. Bookmarks -Correct Answer Created by the user and are shortcuts to websites that are frequently visited or saved for later. They can also contain user account, URL, URL parameters, page title, creation date, and last used date. Browser Forensics -Correct Answer History files, browser cache, and cookies make up the bulk of browser artifacts. You can find the websites a user visited and how many times they visited and when, saved websites, downloaded files, usernames, and what the user searched for. BSSID -Correct Answer (Basic Service Set ID) the MAC address of a base station, used to identify it to host stations. Compliance Search -Correct Answer Powershell cmdlet used for eDiscovery for nearly any kind of search. Connected Standby -Correct Answer In Windows 8, systems with a SSD could take advantage of this new low-power mode. Was expanded upon in Windows 10 with Modern Standby. CurrentControlSet -Correct Answer Identifies which control set is considered the Current one. Contains system config settings needed to control system boot, like the driver and service information. ControlSet001 is typically the set you just booted into the computer with. It is usually the most up to date. ControlSet002 is the "Last Known Good" version, if something drastic happened. Custom Destinations -Correct Answer Created by each application and there is custom. Intended to present content that the application has deemed significant based on either previous usage of the app or through an action that has indicated that an item is of importance to the user. Data Stream Carving -Correct Answer The carving of small fragments of a file, not the whole file. Fragments can be pulled from memory, unallocated space, and allocated database files. Ex: URLs, chat sessions, emails, encryption keys,... DEAD System - Memory Acquisition -Correct Answer You can analysis the by copying it from the root of the system drive. is a crash dump file that can also be used if a full crash dump was taken. is not a complete copy of RAM, but can still provide parts of memory that were paged out to disk. Desktop Activity Monitor (DAM) -Correct Answer Used in conjunction with the BAM key to record the path of the executable and the last date/time executed. The DAM is present on system that have Connected Standby present. DOMStore -Correct Answer This is where Web Store files are stored in IE/Edge. Set up in a similar fashion to cache. WebCacheV*.dat file manages the DOMStore

Show more Read less
Institution
SANS 500
Course
SANS 500










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SANS 500
Course
SANS 500

Document information

Uploaded on
March 11, 2025
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SANS 500


SANS 500 Exam Study Guide Questions
with Correct Answers 2025
Alternate Data Streams (ADS) -Correct Answer ✔Alternative content for a file that exists
by creating additional data pointers within the same NTFS file. Basically the presence of
a second or subsequent data stream. Zone.Identifier is an example of an ADS.

AMCACHE.HVE -Correct Answer ✔Utilized for the internal application compatibility
capability that allows for Windows to run older executables found from earlier iterations
of their OS.

AppCompatCache -Correct Answer ✔Tracks the executable file's last modification date,
file path, and if it was executed. Windows looks at this key to figure out if a program
needs shimming for compatibility.

AppData Folder -Correct Answer ✔Contains custom settings and other information
needed by applications. Contains your Local, LocalLow, Roaming folders. For example,
Web browser bookmarks and cache.

AppID -Correct Answer ✔Each application has a unique id, but they are not unique to
the system. Used to ensure that the application's preferences are not going to conflict
with similar applications. Used in jumplists, in both Custom and Automatic.

Application Log -Correct Answer ✔Records events logged by applications. ex: failure of
MS SQL to access a database

Audit Removable Storage -Correct Answer ✔Logs every interaction with removable
device by user.

Automatic Destinations -Correct Answer ✔Contains a list of application sorted by AppID.
Can be used to map the history of the application from its first use.

Autostart -Correct Answer ✔Lists the programs that run at system boot. Useful to find
malware on a machine that installs on boot, such as a rootkit.

Background Activity Monitor (BAM) -Correct Answer ✔This key is used in conjunction
with the DAM key to record the path of the executable and the last date/time executed.

BagMRU -Correct Answer ✔Based on the keys that are here, you can tell which
directories were opened/closed during a time period.




SANS 500

,SANS 500


Bookmarks -Correct Answer ✔Created by the user and are shortcuts to websites that
are frequently visited or saved for later. They can also contain user account, URL, URL
parameters, page title, creation date, and last used date.

Browser Forensics -Correct Answer ✔History files, browser cache, and cookies make
up the bulk of browser artifacts. You can find the websites a user visited and how many
times they visited and when, saved websites, downloaded files, usernames, and what
the user searched for.

BSSID -Correct Answer ✔(Basic Service Set ID) the MAC address of a base station,
used to identify it to host stations.

Compliance Search -Correct Answer ✔Powershell cmdlet used for eDiscovery for nearly
any kind of search.

Connected Standby -Correct Answer ✔In Windows 8, systems with a SSD could take
advantage of this new low-power mode. Was expanded upon in Windows 10 with
Modern Standby.

CurrentControlSet -Correct Answer ✔Identifies which control set is considered the
Current one. Contains system config settings needed to control system boot, like the
driver and service information. ControlSet001 is typically the set you just booted into the
computer with. It is usually the most up to date. ControlSet002 is the "Last Known
Good" version, if something drastic happened.

Custom Destinations -Correct Answer ✔Created by each application and there is
custom. Intended to present content that the application has deemed significant based
on either previous usage of the app or through an action that has indicated that an item
is of importance to the user.

Data Stream Carving -Correct Answer ✔The carving of small fragments of a file, not the
whole file. Fragments can be pulled from memory, unallocated space, and allocated
database files. Ex: URLs, chat sessions, emails, encryption keys,...

DEAD System - Memory Acquisition -Correct Answer ✔You can analysis the hiberfil.sys
by copying it from the root of the system drive. memory.dmp is a crash dump file that
can also be used if a full crash dump was taken. pagefile.sys is not a complete copy of
RAM, but can still provide parts of memory that were paged out to disk.

Desktop Activity Monitor (DAM) -Correct Answer ✔Used in conjunction with the BAM
key to record the path of the executable and the last date/time executed. The DAM is
present on system that have Connected Standby present.

DOMStore -Correct Answer ✔This is where Web Store files are stored in IE/Edge. Set
up in a similar fashion to cache. WebCacheV*.dat file manages the DOMStore


SANS 500

, SANS 500

filenames and the owning sites. It includes creation and last access timestamps for Web
Storage artifacts.

Exchange Database (EDB) -Correct Answer ✔Container for user Microsoft Exchange
mailboxes. Stored in ESE format.

Email Header -Correct Answer ✔Required component. Provides the envelope that a
message relies on for getting it to the destination. Only completely reliable information
from the Mail Transfer Agent that you own or trust.

EMDMgmt -Correct Answer ✔Traditionally used for ReadyBoost to remember whether it
passed inspection. Each key in it provides the USB device manufacturer, ID, Serial
Number, Volume Name, and Volume Serial Number.

ESE Database -Correct Answer ✔A proprietary Microsoft database format. Can be
broken up into multiple storage groups, each able to contain multiple database files.

Exif Data -Correct Answer ✔Also called metadata, this is information electronically
attached to each image file, such as shutter speed, aperture, ISO, lens length, white
balance, and other settings used when taking the picture.

File Carving -Correct Answer ✔The process of recovering intact files from memory or
unallocated space. It is done by scanning for known file headers at cluster boundaries
and carve a file out based on a "predicted" length or until a known footer is found.
Generally results in a lot of false positives.

File Header -Correct Answer ✔A sequence of bytes that are generally unique to each
file found at the beginning of the file itself.

File MRU -Correct Answer ✔This key will list many of the recent documents,
spreadsheets, and PowerPoint presentation that the user has opened. This key can go
much further back in time than RecentDocs, due to having more space and not needing
to overwrite the data as fast.

Hive Flush -Correct Answer ✔In a dirty hive situation, where transaction log files contain
data not yet written to the registry, when the changes are written to disk, it is called a
hive flush.

HKEY_CLASSES_ROOT -Correct Answer ✔Includes information about which filename
extensions map to particular applications.

HKEY_CURRENT_USER -Correct Answer ✔Stores settings that concern the current
logged on user.




SANS 500

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PossibleA Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
989
Member since
4 year
Number of followers
650
Documents
12777
Last sold
2 days ago
POSSIBLEA QUALITY UPDATED EXAMS

Choose quality study materials for nursing schools to ensure success in your studies and future career. "Welcome to PossibleA - your perfect study assistant! Here you will find Quality sheets, study materials, exams, quizzes, tests, and notes to prepare for exams and study successfully. Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers and checked for quality. Our quality sheets are an easy and quick way to remember key points and definitions. And our study materials, tests, and quizzes will help you absorb the material and prepare for exams. Our store also has notes and lecture summaries that will help you save time and make the learning process more efficient.

Read more Read less
3.9

143 reviews

5
74
4
25
3
21
2
1
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions