Digital Forensics Flashcards

(30 cards)

1
Q

The application of investigation and analysis techniques to gather and preserve evidence from digital sources.

A

Digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The formal documentation that proves evidence has not been altered and was handled properly.

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A hash value used to verify the integrity of forensic images and data.

A

MD5 or SHA-1 hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Making an exact, bit-for-bit copy of a digital device for forensic analysis.

A

Imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The first response step in forensics to ensure systems are not tampered with.

A

Evidence preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The safest type of imaging that doesn’t modify the original data.

A

Write-blocked imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A forensic action used to reconstruct attacker activity from logs or memory.

A

Timeline analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A forensic process that recovers deleted or fragmented data.

A

File carving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A temporary, volatile data source that must be captured before shutting down a system.

A

RAM (volatile memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The stage in digital forensics where collected data is reviewed for evidence.

A

Examination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of documenting forensic findings and presenting them clearly to stakeholders.

A

Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A live forensic technique used to collect data from a system while it’s running.

A

Volatile data acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tool used to analyze disk images and file systems in forensic investigations.

A

Autopsy or FTK Imager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The final phase of the forensic process where lessons learned are shared.

A

Post-incident review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The type of forensics used to investigate suspicious behavior within logs and event files.

A

Log forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An incident type requiring forensics when intellectual property is stolen.

A

Data breach investigation

17
Q

The standard order of volatility when collecting evidence.

A

CPU cache → RAM → disk → backups

18
Q

A location in digital forensics where original evidence is securely stored.

A

Evidence locker

19
Q

Forensic technique used to analyze unallocated disk space.

A

Slack space analysis

20
Q

Temporary storage space that may hold valuable artifacts like passwords or recent files.

A

Pagefile or swap file

21
Q

The process of examining running processes, open connections, and system artifacts on live systems.

A

Live forensics

22
Q

A type of tool that helps identify who accessed what file and when.

A

File access audit tool

23
Q

The forensic process of validating that the evidence matches what was originally acquired.

A

Integrity check

24
Q

The device used to prevent modification during forensic acquisition.

A

Hardware write blocker

25
The practice of isolating systems to prevent tampering during forensic review.
Evidence containment
26
A tool used to extract browser history, cookies, and cache during investigations.
Internet Evidence Finder (IEF)
27
Artifacts like shellbags, prefetch files, and jump lists are found in what system?
Windows OS
28
A standard forensic format used to store disk images.
E01 format
29
The forensic method used to understand what was done on a device without directly examining it.
Artifact analysis
30
A structured process for identifying, collecting, analyzing, and preserving digital evidence.
Forensic investigation lifecycle