Domain 7 Flashcards

1
Q

taking a bit by bit image or binary image of physical memory, gathering details about running processes and gathering network connection data

A

live forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

portions of a disk partition that are marked as actively containing data

A

allocated space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

portions of a disk partition that do not contain active data

A

unallocated space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data is stored in specific sized chunks known as clusters which are sometimes referred to as sectors or blocks

A

slack space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hard disks routinely end up with sectors that cannot be read due to some physical defect

A

bad block/clusters/sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legal counsel gaining access to pertinent electronic information during the pretrial discovery phase of civil legal proceedings

A

e-discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident response steps

A

detection ( identification)
response ( containment )
mitigation ( eradication )
reporting
recovery
remediation
lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

incident response phase that includes steps before an incident occurs. ex: preparing an incident handling checklist

A

preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

incident response phase, aka identification, is the phase in which events are analyzed in order to determine whether these events might comprise a security incident

A

detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

incident response phase, aka containment, is the point at which the incident response team begins interacting with affected systems and attempts to keep further damage from occuring as a result of the incident

A

response (containment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A binary forensic backup is made of systems in what incident response phase?

A

response (containment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

incident response phase, aka eradication, that involves the process of understanding the cause of the incident so that the system can be reliably cleaned and ultimately restored to operational status later in the recovery phase

A

mitigation (eradication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

incident response phase ____ occurs throughout the process beginning with detection

A

reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

incident response phase that involves cautiously restoring the system or systems to operational status

A

recovery phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

incident response phase that occurs during the mitigation phase and involves mitigating vulnerabilities in the system

A

remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the goal of this incident response phase is to provide a final report on the incident which will be delivered to management

A

lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A worm spreading on a trusted network; NIDS alerts

What kind of positive/negative?

A

true positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

User surfs the web to an allowed site; NIDS is silent

What kind of positive/negative?

A

True negative

19
Q

User surfs the web to an allowed site; NIDS alerts

What kind of positive/negative?

A

False positive

20
Q

A worm is spreading on a trusted network; NIDS is silent

What kind of positive/negative?

A

False negative

21
Q

Regarding RAID, ___ achieves full data redundancy by writing the same data to multiple hard disks

A

mirroring

22
Q

Regarding RAID, ___ focuses on increasing read/write performance by spreading data across multiple hard disks. This does not provide data redundancy.

A

striping

23
Q

Regarding RAID, ___ achieves data redundancy without incurring the same degree of cost as that of mirroring in terms of disk usage and write performance

A

parity

24
Q

Aka stripe set, RAID __ employs striping to increase the performance of read and writes

A

0

25
Q

Aka mirrored set, RAID __ creates/writes an exact duplicate of all data to an additional disk

A

1

26
Q

RAID __ is a legacy technology that requires either 14 or 39 hard disks and a specially designed hardware controller, which makes this RAID cost prohibitive

A

2

27
Q

RAID ___ stripes data at the byte level across multiple disks but an additional disk is used for parity

A

3

28
Q

Provides same functionality as RAID 3 but strips data at the block level rather than byte.

A

4

29
Q

RAID __ is a striped set with distributed parity across the same striped disks. Most popular RAID because it provides low cost performance and redundancy is 1 disk fails

A

5

30
Q

Same as RAID 5, but accommodates for failure of 2 disks rather than 1

A

6

31
Q

A striped set of mirrors. aka RAID 1+0 to indicate a nested RAID

A

RAID 10

32
Q

Provides procedures and capabilities to sustain an organization’s essential strategic functions at an alternate site for up to 30 days

A

Continuity of Operations Plan (COOP)

33
Q

Provide coordinated procedures for minimizing loss of life or injury and protecting property damage in response to a physical threat

A

Occupant Emergency Plan (OEP)

34
Q

NIST 800-34 is

A

Contingency Planning Guide for Federal Information Systems

35
Q

ISO/IEC-27031 is

A

focuses on BCP

36
Q

BS 25999-2 was replaced by

A

BS ISO 22301 Business Continuity Management Systems Requirements

37
Q

states that when a crime is committed
the perpetrator will leave something
behind and take something with them

A

Locard’s Principle

38
Q

Most digital evidence is found in ____ storage

A

secondary

39
Q

The court views unaltered evidence as ___

A

best evidence

40
Q

Heuristic scanners are prone to false positives but are useful in detecting ____

A

zero day vulnerabilties

41
Q

Archive bit is flipped to ___ when no back up is required

A

0

42
Q

Archive bit is flipped to ___ when a file is created or modified

A

1

43
Q

Who must approve RPO, RTO, WRT, and MTD?

A

System Owner

44
Q

You should always restore the most ___ systems first

A

critical