Set 3 Flashcards

1
Q

Which areas of a windows host should you focus on investigating for windows information?

A

Registry, event logs, memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Running commands on a suspects windows system, what is the best practice?

A

Run windows commands from a USB drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Out of these what would not be considered volatile evidence?
Open shares and files
Running processes
Network connections
Shadow volume copies

A

Shadow volume copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where to collect windows based tool?

A

Windows system control center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which command would a forensics analyst use to determine what processes are running on windows based system?

A

Tasklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which command would be used to list active network connections?

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does this command do?
Net users&raquo_space; output.txt

A

Appends the information to a txt file.
» always has something to do with append

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Juanita is performing windows laptop search, consent and search and seizure form, wants to make a copy of the contents of physical memory of the host, what does she use?

A

Dumpit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Forensic analyst on windows host, a registry key shows ClearpagefileatShutdown, what does this mean?

A

No virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which registry hive is populated once the user logs in?

A

current user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is not considered a main give of registry?

A

Config update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Metadata is encrypted and hidden in a different file, True or false

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows based laptop investigation, suspect may have installed malware on purpose, to confirm John runs in vm, what analysis is this?

A

Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which area is best for investigation for users suspicious internet related activities?

A

Browser cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In an investigation Liv uses volatility, employee wont give password, she tries every possible password to enter computer, what method is this called?

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During data investigation, aleta uses volatility, employee wont give password, what is a hydra tool used to get passwords?

17
Q

What are volatility modules?

A

Hive list, image info, system info, hash dump

18
Q

Which tool can be used to analyze hard drive images on linux, windows, mac?

19
Q

One TB in size analysis, how much space should she have?

A

Three terabytes

20
Q

Which soft skill is important to being important to being a data forensic analyst?

A

attention to detail

21
Q

What password hash is considered the strongest?

22
Q

What nist program must verify tools?

A

CFTT computer forensics tools testing

23
Q

Know what classifies as hardware

A

You should know this

24
Q

Osi layer that routes traffic between ip hosts?

A

Layer 3 network layer

25
Tcp and udp operate at which level of the OSI?
Transport layer
26
Trivial FTP is _____
UDP
27
What port is associated with websites HTTPS?
443 tcp
28
85% of internet traffic is encrypted, why is this?
Due to intrusion detection
29
Which can be reviewed on a host to determine what other hosts have communicated with it?
ARP address resolution protocol
30
Wireshark three way handshake?
SYN > SYN, ACK > ACK
31
Which tool is used to view an output of active connections?
netstat
32
Which exe is associated with a specific process number?
PID
33
Greg is apart of information security team, server problem, greg does network tap, he enables what mode to see traffic?
Promiscuous
34
Attacker deletes an event log how do you know?
Centralized logs
35
Sending an event log to another host?
Udp 514, windows event forwarding
36
Blank protocol is used to synchronize?
Network time protocol NTP
37
Qraar or Splunk is only able to collect event logs form firewalls, as many firewalls as its licensed for? True or false
false
38
5 different parts of the network tuple?
source IP, source port, destination IP, destination port, and the protocol.