100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

DFIR - Digital Forensics Incident Training XM WITH COMPLETE SOLUTIONS.

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
04-09-2024
Geschreven in
2024/2025

Hot site A backup that is running continuously and ready for imediate switchover warm site Servers & other resources for backup but not as ready for switchover Previous Play Next Rewind 10 seconds Move forward 10 seconds Unmute 0:00 / 0:15 Full screen Brainpower Read More cold site Cheapest backup option does not always have the necessary equipment to enable the resumption of normal operation Connscan Scans for identifiable TCP connections in older versions of Windows Sockets Scans for all our sockets NetScan Can be used in more recent versions of Windows Conscan should be used as a complimentary plugin with Sockets Static Binaries use a minimal footprint on the system as they are not dependent on libraries pre-install on the Linux OS. & Doesn't require other files to run Where can Linux logs be found? /var/log Where can you view Windows logs? Event Viewer What is that thing where Splunk finds related events? Correlation How are vulvectomies tracked? By a CVE number What should you focus on when threat hunting? Anomalies What is the purpose of intelligence? To provide an advantage over your adversary Zeek is a tool for... Analyzing network traffic UBA, User behavior analytics knows what "normal " is for each user? True Where does fileless malware get stored? It doesn't Which does NOT contain memory artifacts that can be analyzed? RAM disk What contains memory artifacts that can be analyzed? - Crash dump file - Page file - Hibernation file When inspecting processes we look at all of the following: - parent process - network connections - DLLs used What do we not look for when inspecting processes? Process size You can recover a computer's RAM only when it is turned .. Off Because Linux presents everything as a file, it makes it easier to: Analyze What is in the swap file? Stuff that wouldn't fit in RAM When investigating a process in Linux we can get all of these Except for.. Where the process was downloaded from What can we not get when the computer is turned off? RAM What tool is used to make a copy of a hard drive? FTK Imager What tool is used to analyze a hard drive after we copy it? Autopsy What is the first step in analyzing a drive? Find the partitions What file keeps a list of everything on a drive? MFT - Master File Table What will prefetch help find the evidence of? A process that had been run Where can a file be hidden in Windows? In the Alternate Data Stream What does a magic number do? Identify the file type What is the correct process used by APT groups? OSINT>External Takeover>Privilege Escalation >Lateral Movement and Internal Takeover>Hiding Mechanism and Information Theft To investigate a network attack in accordance with the network forensics investigation flow process, what should be the first step? Check for malware signatures To test company software and analyze its behavior in real-time, which of the following should be used? Dynamic analysis Which of the following tools can check network connections? To investigate if any network connections were established. Netstat A pop-up appears saying your computer files were infected, and offering to fix the problem for free.. what of the following attacks did you encounter? Scareware What is the difference between threat hunting and threat intelligence? Threat intelligence is a process within Threat Hunting and involves learning from other sources Why is it important to use logs? They store records of potentially important events. Which of the following is used for minimal footprint in a system? Static binaries which of the following can help examine a process like a file named ? Process Dump Which of the following systems contains metadata for each stored file? NTFS Which of the following can check to make sure employees are not entering prohibited sites? DNS cache Which of the following contains RAW data, has no format, only bytes, and requires tools for capture? Physical memory Why is it important to use an IR plan? When an incident occurs, the IR team will be under pressure to mitigate it, and having an IR plan can help focus on performing the necessary tasks Which of the following services provides proof of the origin and integrity of data? Non-repudiation Which of the following is a common identification method that can verify the identity of specific files? Hashing What are the stages of SANS methodologies? Preparation, Identification, Containment, Eradication, recovery, and Lessons Learned What are the stages of NIST methodologies? Preparation, detection & analysis, containment, eradication & recovery, post-incident Activity What are some notable advantages for Dynamic analysis over static analysis? Tracking changes, obfuscated data, context u What are MFT attributes? Standard information Attribute list File name Security descriptor Data Object ID Index root What OS does NTFS run in? Windows 10, 8, 7, vista, XP, 2000 &NT What is the MRB process steps? BIOS settings are loaded The OS partition is located The OS is loaded from the boot sector Data Carving is a forensics technique that involves what? Reassembling files from pieces of raw data, when no file system metadata is available What are Data Carving Tools? Bulke extractor, HxD, PhotoRec Which of the following is NOT CPU architecture? Pi Which of the following is CPU architecture? NASM, ARM, MIPS Which of the following tools can be used to obfuscate malware code? UPX Which tool should an investor use to dynamically investigate malware? Debugger Which of the following should be monitored during dynamic malware analysis? -Network activity -Registry changes -File system changes What is the responsibility of a CISO? To create a strategy for data and IT asset protection and maintain it Which of the following is NOT a feature of Wireshark? Replace network traffic Which of the following is a feature of Wireshark? -object export -stream inspection -display filters Which of the following tools can be used to find persistent malware? Autoruns Which of the following tools can be used to research RAM dumps? Volatility Which of the following statements is true? When data is erased from the operating system, it remains on the HDD until it is overwritten Which of the following is NOT included in the digital forensics process? Penetration testing Which of the following is part of the digital forensics process? Collection, reporting, examination How is a file hidden using steganography? By hiding a file within another file Which of the following is the most common file system used in Linux distributions? Ext4 Which of the following tools can be used for drive cloning? -dd -FTK Imager What is a sandbox used for? To test malware in an isolated environment Which of the following is a Windows Rvent Viewer classification? -Error -Debug -Alert Which of the following is NOT a tool that is used for data carving? DumpIt Which of the following are commonly used for malware persistence? -Services -Registry Keys What is the difference between Wireshark and tcpdump? tcpdump is command-based; Wireshark has a GUI interface Which of the following is NOT a containment strategy for a cybersecurity incident? Updating IDS rules Non Repudiation provides: Provides proof of the origin & integrity of data Which of the following is not an IR role? Stress check Which of the following tools is used to look for embedded executable code? Binwalk Which of the following is NOT a body section of a portable executable (PE) file? .header Which of the following is a body section of a portable executable (PE) file? .text , .rdata , .data Which of the following is a digital forensics method? Live analysis Which of the following are commonly used for malware persistence? Registry keys, Services Which of the following tools can be used to research RAM dumps? Volatility Which of the following are anti-forensic techniques? Tunneling, Steganography Which of the following is a network sniffing tool? tcpdump Which of the following will generate a log by default? Linux Authentication process, Web servers, Proxy Servers Which of the following can be used to identify a file as malicious? Hash Add or remove terms Cho

Meer zien Lees minder
Instelling
DFIR
Vak
DFIR









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
DFIR
Vak
DFIR

Documentinformatie

Geüpload op
4 september 2024
Aantal pagina's
5
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

DFIR - Digital Forensics Incident Training
EXAM WITH COMPLETE SOLUTIONS




Hot site - ANSWER- A backup that is running continuously and ready for imediate
switchover
warm site - ANSWER- Servers & other resources for backup but not as ready for
switchover
cold site - ANSWER- Cheapest backup option does not always have the
necessary equipment to enable the resumption of normal operation
Connscan - ANSWER- Scans for identifiable TCP connections in older versions of
Windows
Sockets - ANSWER- Scans for all our sockets
NetScan - ANSWER- Can be used in more recent versions of Windows
Conscan should be used as a complimentary plugin with - ANSWER- Sockets
Static Binaries - ANSWER- use a minimal footprint on the system as they are not
dependent on libraries pre-install on the Linux OS. & Doesn't require other files to
run
Where can Linux logs be found? - ANSWER- /var/log
Where can you view Windows logs? - ANSWER- Event Viewer
What is that thing where Splunk finds related events? - ANSWER- Correlation
How are vulvectomies tracked? - ANSWER- By a CVE number
What should you focus on when threat hunting? - ANSWER- Anomalies
What is the purpose of intelligence? - ANSWER- To provide an advantage over
your adversary
Zeek is a tool for... - ANSWER- Analyzing network traffic
UBA, User behavior analytics knows what "normal " is for each user? - ANSWER-
True
Where does fileless malware get stored? - ANSWER- It doesn't
Which does NOT contain memory artifacts that can be analyzed? - ANSWER-
RAM disk
What contains memory artifacts that can be analyzed? - ANSWER- - Crash dump
file
- Page file

, - Hibernation file
When inspecting processes we look at all of the following: - ANSWER- - parent
process
- network connections
- DLLs used
What do we not look for when inspecting processes? - ANSWER- Process size
You can recover a computer's RAM only when it is turned .. - ANSWER- Off
Because Linux presents everything as a file, it makes it easier to: - ANSWER-
Analyze
What is in the swap file? - ANSWER- Stuff that wouldn't fit in RAM
When investigating a process in Linux we can get all of these Except for.. -
ANSWER- Where the process was downloaded from
What can we not get when the computer is turned off? - ANSWER- RAM
What tool is used to make a copy of a hard drive? - ANSWER- FTK Imager
What tool is used to analyze a hard drive after we copy it? - ANSWER- Autopsy
What is the first step in analyzing a drive? - ANSWER- Find the partitions
What file keeps a list of everything on a drive? - ANSWER- MFT - Master File
Table
What will prefetch help find the evidence of? - ANSWER- A process that had been
run
Where can a file be hidden in Windows? - ANSWER- In the Alternate Data Stream
What does a magic number do? - ANSWER- Identify the file type
What is the correct process used by APT groups? - ANSWER- OSINT>External
Takeover>Privilege Escalation >Lateral Movement and Internal Takeover>Hiding
Mechanism and Information Theft
To investigate a network attack in accordance with the network forensics
investigation flow process, what should be the first step? - ANSWER- Check for
malware signatures
To test company software and analyze its behavior in real-time, which of the
following should be used? - ANSWER- Dynamic analysis
Which of the following tools can check network connections? To investigate if
any network connections were established. - ANSWER- Netstat
A pop-up appears saying your computer files were infected, and offering to fix the
problem for free.. what of the following attacks did you encounter? - ANSWER-
Scareware
What is the difference between threat hunting and threat intelligence? - ANSWER-
Threat intelligence is a process within Threat Hunting and involves learning from
other sources
Why is it important to use logs? - ANSWER- They store records of potentially
important events.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
BRAINSCAPE1 Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
126
Lid sinds
1 jaar
Aantal volgers
14
Documenten
11145
Laatst verkocht
2 weken geleden
download to pass in your exam

**Profile: Exam and Flashcards Sales**. **Introduction:** Welcome to my profile! I specialize in providing comprehensive exam and flashcard resources tailored to meet your educational needs. With a dedication to quality and effectiveness, I aim to assist students in achieving their academic goals with ease and confide**Services Offered:** 1. **Exam Materials:**- I offer a wide range of exam materials for various subjects and levels, including standardized tests such as SAT, ACT, GRE, GMAT, TOEFL, and more- These materials are meticulously crafted to cover all exam topics comprehensively, ensuring thorough preparation and confidence on test day. 2. **Flashcards:** - My collection of flashcards is designed to facilitate efficient learning and retention of key concepts. - Each set of flashcards is carefully curated to highlight essential information, making studying more manageable and effective. **Why Choose Me:** 1. **Quality Assurance:** - I prioritize quality in all my products, ensuring accuracy, relevance, and reliability. - Every exam material and flashcard set undergoes rigorous review and updating to reflect the latest changes in curriculum and exam formats. 2. **User-Friendly Resources:** - My resources are user-friendly, featuring clear formatting, concise explanations, and intuitive organization to enhance the learning experience. - Whether you're a visual learner or prefer text-based study aids, my materials cater to diverse learning preferences. 3. **Affordability:** - I believe that access to quality educational resources should not be cost-prohibitive. Thus, I offer competitive pricing without compromising on quality.

Lees meer Lees minder
4,4

20 beoordelingen

5
12
4
5
3
2
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen