Digital Forensics Flashcards

(28 cards)

1
Q

What is the Forensic Process by NIST?

A

Collection, Examination, Analysis, Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Admissibility?

A

Relatability to disputed facts and violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Order of Volatility?

A

Securing more perishable evidence first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Random Access Memory (RAM)

A

Volatile memory used to run applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the CPU Cache?

A

A fast block of volatile memory used by the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is used when RAM is exhausted?

A

Swap/Page File/ Virtual Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does RAM stand for

A

Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can command-line tools be used for?

A

Showing information about the computer and the established ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Chain of Custody?

A

Ensurance of evidence being collected with no breaks in the chain
Crucial Aspect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is it known as when Chain of Custody has been carried out properly?

A

Data Provenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is it known as to protect documents that are evidence?

A

Legal or Litigation hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Artifacts

A

Log files
Registry hives
DNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do we have top take Forensic Copies?

A

For analyzing; we must keep the original data intact and unaltered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do we take System Images

A

To capture a PC and search for criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can be reverse engineered, and is susceptible to rootkit and backdoor attacks?

A

Firmware or Embedded Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why do we take hashes?

A

To analyze data

17
Q

When doing an investigation, where are the places we can look?

A

Network Traffic
Firewall
NIPS
NIDS

18
Q

What do we need to do to in order to use data as evidence in court?

A

Ensure that it is in its original state

19
Q

What is the process known as recovery?

A

Dealing with an incident, and possibly restoring from a backup

20
Q

What Stage is verifying the purpose of cloud forensics?

21
Q

What Stage is verifying the type of cloud service?

22
Q

What Stage is verifying the type of technology behind the cloud?

23
Q

What is Stage D of Cloud Forensic 26?

A

Verifying the role of the user and negotiate with the Cloud Service Provider to collect evidence required

24
Q

Why was Cloud Forensic 26 created?

A

To focus on the competence and admissibility of evidence

25
What is the purpose of a Right-to-Audit Clause?
To ensure that the contractor is being compliant with its obligation under contract
26
An agreement between the US and EU to give law enforcement agencies in each country faster access to evidence held by providers
General Data Protection Regulation (GDPR)
27
What is the CLOUD act of 2018
An act to address the FBI in forcing Microsoft to hand over data stored in Ireland
28
Allowed the UK to seek data stored overseas as part of a criminal investigation
Overseas Production ACT (COPOA)