Network Forensics Flashcards

(40 cards)

1
Q

The process of capturing, recording, and analyzing network events to discover the source of security incidents.

A

Network forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A detailed copy of all packets transferred across a network used for forensic analysis.

A

Packet capture (PCAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A tool used for capturing and analyzing live network traffic at the packet level.

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of reviewing and interpreting traffic after it has been recorded.

A

Offline network traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A log that summarizes communication between devices by showing IPs, ports, byte counts, and durations.

A

NetFlow log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A forensic approach that identifies anomalies in the volume or direction of network traffic.

A

Traffic pattern analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The technique of tracing traffic to its origin by following packet paths across devices.

A

Network trace route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A protocol analyzer that provides low-level details of network communications.

A

Packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term for a complete, raw copy of all traffic on a network segment.

A

Full packet capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of capture that records only metadata (e.g., headers), not the packet payload.

A

Header capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The practice of examining DNS logs to identify malicious domain queries.

A

DNS forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A tool that provides behavioral alerts by comparing traffic against a baseline.

A

Anomaly-based NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system that passively monitors network traffic for signs of suspicious activity.

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network-based system that can block malicious traffic in real time.

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of identifying and reconstructing application-level content from packet captures.

A

Protocol decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A system used to correlate logs from various sources including firewalls, routers, and endpoints.

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The type of evidence that network logs and PCAPs represent in a legal investigation.

A

Digital evidence

18
Q

A key principle that ensures evidence is not altered during analysis.

A

Chain of custody

19
Q

The term for viewing sessions and conversations in order to reconstruct attacker activity.

A

Session reconstruction

20
Q

A traffic type that is considered a red flag in network forensics when using unusual ports.

A

Protocol misuse

21
Q

The process of extracting files or payloads from network packet captures.

22
Q

Logs generated by security appliances such as firewalls, routers, and proxies.

A

Perimeter device logs

23
Q

A source of logs that show connection attempts and traffic direction between hosts.

A

Firewall logs

24
Q

Logs that help identify abnormal login times, failed attempts, or session hijacking.

A

Authentication logs

25
A file type commonly used to store and share captured packets.
.pcap file
26
A method used to identify large data transfers that could indicate exfiltration.
Bandwidth analysis
27
The practice of matching a known IOC (IP, hash, domain) with traffic data.
Threat intelligence correlation
28
The challenge of analyzing encrypted traffic without visibility into payloads.
TLS/SSL inspection limitation
29
A tool or device that duplicates traffic to a separate monitoring port for analysis.
Network TAP (Test Access Point)
29
The area where logs are centralized and archived for long-term forensic review.
Log aggregation platform
30
The ability to identify who performed an action and when, using network logs.
Attribution
31
Technique used to detect traffic going to known C2 infrastructure.
C2 beacon detection
32
Evidence of periodic, consistent external connections from infected hosts.
Beaconing behavior
33
A sign of internal scanning where one host sends SYN packets to multiple internal devices.
Lateral movement attempt
34
Log evidence showing repeated connection attempts to a closed port.
Port scanning
35
Protocol often analyzed in forensics to find user credentials or commands in plaintext.
FTP or Telnet
36
A forensic red flag when a non-web protocol runs over port 80 or 443.
Protocol tunneling
37
Activity showing large outbound traffic to an unusual country or IP.
Data exfiltration
38
A timeline of network events that correlates attacker behavior across systems.
Incident timeline reconstruction
39
The final step of a forensic investigation where a report is delivered to stakeholders.
Findings documentation