Term
Which three disciplines make up the "investigations triad"? |
|
Definition
Vulnerability/Threat Assessment and Risk Management; Network Intrusion Detection and Incident Response; Digital Investigation |
|
|
Term
Which of the following is an example of hearsay evidence? |
|
Definition
Hearsay: “They guy told me he did it” “He said he knew who did it, and could testify” “I saw a recording of the whole thing go down” A text file containing a personal letter |
|
|
Term
In which phase of the attack methodology do we try to identify hosts that we can then look for vulnerabilities on? |
|
Definition
|
|
Term
In which phase of the attack methodology do we use google and social media to learn about our target? |
|
Definition
|
|
Term
In which phase of the attack methodology do we correlate open ports and running services to a potential attack vector? |
|
Definition
|
|
Term
In which phase of the attack methodology do we actually "break in" to a system? |
|
Definition
Phase #4. Privilege Escalation/ Exploitation |
|
|
Term
Which of the following is an example of Technical Reconnaissance? |
|
Definition
1. Social Engineering 2. Registration Info 3. Open Source Intel 4. OSINT via Social Media |
|
|
Term
Which of the following is an example of "Low-Tech" Reconnaissance? |
|
Definition
1. Visiting Target 2. Breaking into Target 3. Dumpster Diving 4. Social Engineering |
|
|
Term
Baiting is an example of Social Engineering using? |
|
Definition
|
|
Term
Pretending to be a vendor or recruiter and calling a target is an example of? |
|
Definition
|
|
Term
The Domain Name Registration records provide which of the following? |
|
Definition
1. Administrative info on the target 2. Points of contact 3. Domain expiration date |
|
|
Term
Open Source Intelligence requires us to access the target systems directly? |
|
Definition
|
|
Term
|
Definition
Open Source Intel (OSINT) |
|
|
Term
Which of the following is the best search engine to find all Linksys WRT54G routers attached to the internet? |
|
Definition
|
|
Term
Bing can be BEST used to identify? |
|
Definition
|
|
Term
In TCP/IP, what is the correct way to open a connection to a remote system using the 3-way handshake? |
|
Definition
1. Send SYN 2. Rec. SYN, send SYN-ACK 3. Rec SYN-ACK, Send ACK |
|
|
Term
In TCP/IP, what is the correct way to close a connection with a remote system using the 3-way handshake? |
|
Definition
1. 1st app sends FIN (active close) 2. 2nd app rec's SYN, sends ACK (passive close) 3. 1st app rec's ACK 4. Later, 2nd app send FIN (active close) 5. 1st app rec's FIN, sends ACK 6. 2nd app rec's ACK |
|
|
Term
Which NMAP scan type attempts to complete the 3-way handshake with each scanned port? |
|
Definition
|
|
Term
Which NMAP scan type only sends the initial SYN request and waits for an ACK to detect the open port? |
|
Definition
|
|
Term
Which NMAP scan type allows an attacker to get past some packet filtering devices? |
|
Definition
|
|
Term
Which of the following NMAP command line strings will scan a target for specific web ports, and perform version detection of those ports? |
|
Definition
|
|
Term
A vulnerability is known as the intersection of which three elements? |
|
Definition
1. System susceptability/flaw 2. Access to the flaw 3. Exploitation of the flaw |
|
|
Term
A vulnerability is known as the intersection of exploiting a flaw, access to a flaw, and what? |
|
Definition
System susceptability/flaw |
|
|
Term
Which of the following is a publicly available vulnerability list? |
|
Definition
1. US-CERT 2. SANS ISC 3. SANS Top 20 4. Vendor Advisories 5. NIST Vulnerability Database 6. Mitre CVE Database 7. Open Source Vulnerability Database |
|
|
Term
|
Definition
A piece of software, chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware |
|
|
Term
Which of the following are types of exploits? |
|
Definition
1. Remote (runs over a network) 2. Local (runs directly on victim) 3. Client Side (runs on client, such as browser or other application) |
|
|
Term
Core Impact is an example of what? |
|
Definition
an exploit framework/penetration testing suite |
|
|
Term
Exploit-DB is a resource to find? |
|
Definition
fully functional exploits |
|
|
Term
Packet Storm is a resource to find? |
|
Definition
fully functional exploits, proof-of-concept code
|
|
|
Term
|
Definition
started in 2003 by HD Moore |
|
|
Term
Metasploit was originally written in which programming language? |
|
Definition
|
|
Term
Metasploit was ported to which programming language in 2006? |
|
Definition
|
|
Term
Which company purchased Metasploit in 2009? |
|
Definition
|
|
Term
What is the name of the Graphical Front End to Metasploit? |
|
Definition
|
|
Term
Malware is code that has an adverse impact on which of the following? |
|
Definition
Confidentiality, integrity, availability |
|
|
Term
Malicious code triggered by user action is an example of what? |
|
Definition
|
|
Term
What phase of a virus is when it is replicating iteself? |
|
Definition
|
|
Term
What phase of a virus is when it performs its malicious action or payload? |
|
Definition
|
|
Term
When a logical condition causes a virus to move from a dormant or propagation phase is which phase? |
|
Definition
|
|
Term
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself is a? |
|
Definition
|
|
Term
Conficker is an example of which malware? |
|
Definition
|
|
Term
Which malware is named after ancient Greek history? |
|
Definition
|
|
Term
What malware modified an operating system to hide the existence of itself or other malware? |
|
Definition
|
|
Term
What ISO standard was ratified for digital forensics in October 2012? |
|
Definition
ISO 27037 Information Technology - Secuirty Techniques |
|
|
Term
The Federal Rules of Evidence (FRE) was created to ensure what? |
|
Definition
consistency in federal proceedings (many states base laws on the FRE) |
|
|
Term
When did the FBI form the Computer Analysis and Response Team (CART)? |
|
Definition
|
|
Term
Which US Constitutional Amendment protects everyone's right to be secure from search and seizure? |
|
Definition
|
|
Term
Investigating digital devices include? |
|
Definition
Collecting data securely; examining suspect data to edetermine details such as origin and content; presenting digital information to courts; applying laws to digital device practices |
|
|
Term
Digital Evidence is the same as Data Recovery? |
|
Definition
No, forensics includes retrieving information that was deleted by mistake or lost during a power surge or server crash |
|
|
Term
Which Digital Evidence role arrives on the incident scene assesses the situation, and takes precautions to acquire and preserve evidence? |
|
Definition
Digital Evidence First Responder (DEFR) |
|
|
Term
Which Digital Evidence role has the skill to analyze the data and determine when another specialist should be called in to assist? |
|
Definition
Digital Evidence Specialist (DES) |
|
|
Term
What policy defines rules for using a company's computers and networks? |
|
Definition
|
|
Term
How can a business avoid litigation and inform end users that the organization reserves the right to inspect computer systems and network traffic at will? |
|
Definition
Business displays a warning banner that says the system owner reserves the right to inspect and monitor use and there should be no expectation of privacy |
|
|
Term
Which of the following situations are most common for private sector investigations? |
|
Definition
Abuse or misuse of computing assets Email abuse Internet abuse |
|
|
Term
The route evidence takes from the time it is found until the case is closed or goes to court is called? |
|
Definition
|
|
Term
What do you secure evidence in? |
|
Definition
Antistatic evidence bags or pads |
|
|
Term
Which of the following would you use to secure your evidence? |
|
Definition
Locker in digital lab facility/Forensic workstation |
|
|
Term
Which of the following is a basic requirement for setting up your forensics workstation? |
|
Definition
Basic requirements A workstation running necessary OS (usually Windows) A write-blocker device Digital forensics acquisition tool Digital forensics analysis tool Target drive to receive the source or suspect disk data Spare PATA or SATA ports USB ports
Additional useful items Network interface card (NIC) Extra USB ports FireWire 400/800 ports SCSI card Disk editor tool Text editor tool Graphics viewer program Other specialized viewing tools |
|
|
Term
How often should you plan to schedule equipment upgrades in your forensics lab? |
|
Definition
Plan on every 18 months, preferably every 12 months |
|
|
Term
Which of the following is an example of best evidence? |
|
Definition
Best Evidence: A photo of the crime scene A copy of a signed contract A file recovered from a hard drive A bit-for-bit snapshot of a network transaction (pcap) |
|
|
Term
Which of the following is an example of business records? |
|
Definition
Business Records Contracts and other employment agreements Invoices and records of payment received Routinely kept access logs /var/log/messages |
|
|
Term
Which of the following is an example of circumstantial evidence? |
|
Definition
Circumstantial Evidence: An email signature file containing password hashes on the defendant’s computer The serial number of the USB device |
|
|
Term
Which of the following is an example of digital evidence? |
|
Definition
Digital Evidence Emails and IM sessions Invoices and records of payment received Browser activity, including web-based email Routinely kept access logs /var/log/messages |
|
|
Term
Which of the following is an example or real evidence? |
|
Definition
Real Evidence: Murder weapon Fingerprint/footprint Signed paperwork or contract Physical hard drive or USB device Computer itself |
|
|
Term
A bit-by-bit copy of the original storage medium is known as? |
|
Definition
|
|
Term
A bit-stream copy of all data on a disk or partition is known as? |
|
Definition
“image” or “image file” or Bit-stream Image |
|
|
Term
What is the first rule of computer forensics? |
|
Definition
Preserve the original evidence |
|
|
Term
Which of the following is not a storage format for digital evidence? |
|
Definition
The following ARE:
- Raw format
- Proprietary formats
- Advanced Forensics Format (AFF) |
|
|
Term
Which of the following is an advantage of the RAW format? |
|
Definition
- Fast data transfers - Ignores minor data read errors on source drive - Most computer forensics tools can read raw format |
|
|
Term
Which of the following is a disadvantage of the RAW format? |
|
Definition
- Requires as much storage as original disk or data - Tools might not collect marginal (bad) sector |
|
|
Term
Which of the following is a disadvantage of using a proprietary format? |
|
Definition
- Inability to share an image between different tools - File size limitation for each segmented volume |
|
|
Term
Who developed the Advanced Forensics Format? |
|
Definition
- Dr. Simson L. Garfinkel |
|
|
Term
Is the Advanced Forensics Format open source? |
|
Definition
|
|
Term
Which acquisition method is the most common method and offers the most flexibility? |
|
Definition
Creating a disk-to-image file |
|
|
Term
Sparse acquisition has which of the following characteristics? |
|
Definition
Can take several hours - Logical acquisition captures only specific files of interest - Sparse acquisition collects fragments of unallocated (deleted) data - For large disks - PST or OST mail files, RAID servers |
|
|
Term
At least how many images of digital evidence should you make for contingency planning purposes? |
|
Definition
|
|
Term
In order to validate data acquisitions, what utility is required? |
|
Definition
Hashing algorithm utility |
|
|
Term
Windows does not have a built-in hashing algorithm tool for forensics? |
|
Definition
|
|
Term
RIAD 0's biggest disadvantage is? |
|
Definition
|
|
Term
RAID 1 is less expensive than RAID 0? |
|
Definition
|
|
Term
RAID 5 is similar to which of the following RAIDs? |
|
Definition
|
|
Term
Which of the following are components of a disk drive? |
|
Definition
- Geometry - Head - Tracks - Cylinders - Sectors |
|
|
Term
Given 512 bytes per sector, and using a disk with 1024 cylinders, 64 read/write heads and 63 sectors, how large is the disk in GB? |
|
Definition
- 1024 x 64 x 63 = 4,128,768 sectors - 4,128,768 x 512 / sector = 2,113,929,216 - 2.114 GB |
|
|
Term
It is crucial to make a full forensic copy of a solid-state drive as soon as possible due to what feature? |
|
Definition
|
|
Term
A partition is known as a ? |
|
Definition
|
|
Term
The Windows OS assigns logical addresses to ? |
|
Definition
|
|
Term
Physical addresses refer to ? |
|
Definition
|
|
Term
The unused space between partitions is known as ? |
|
Definition
|
|
Term
The Master Boot Record (MBR) is located at sector? |
|
Definition
|
|
Term
The File Allocation Table (FAT) database is typically written to a disk's innermost track? |
|
Definition
|
|
Term
Which of the following is not contained in the File Allocation Table (FAT) database? |
|
Definition
- Filenames - Directory names - Date and time stamps - Starting cluster number - File attributes |
|
|
Term
Unused space in a cluster between the end of an active file and the end of the cluster is known as? |
|
Definition
|
|
Term
In Microsoft Windows, when a file is deleted which HEX character is used to replace the first letter of the filename? |
|
Definition
|
|
Term
Which of the following is an improvement NTFS has over FAT file systems? |
|
Definition
- NTFS provides more information about a file - NTFS gives more control over files and folders |
|
|
Term
On an NTFS disk, the first data set is what? |
|
Definition
|
|
Term
Records in the NTFS Master File Tabe is called? |
|
Definition
|
|
Term
When reviewing the registry, which file contains the computer's security settings? |
|
Definition
Windows\system32\config\Security.dat |
|
|
Term
When reviewing the registry, which file contains the user-specific configuration settings? |
|
Definition
|
|
Term
Firefox stores its information in what? |
|
Definition
|
|
Term
What table would you reference to uncover visited URLs from a Firefox browser? |
|
Definition
|
|
Term
What table would you reference to uncover typed data from a user in a Firefox browser? |
|
Definition
|
|
Term
EXIF data was originally developed for which image format? |
|
Definition
|
|
Term
When using Volatility to perform memory forensics, which of the following modules provide a list of processes that were running on the computer when the image was taken? |
|
Definition
|
|
Term
When using Volatility to perform memory forensics, what module can be used to reveal any keyboard information typed into the computer at bootup? |
|
Definition
|
|
Term
On mobile devices, the Operating System is stored in? |
|
Definition
|
|
Term
On mobile devices, the system data is stored in? |
|
Definition
electronically erasable programmable read-only memory (EEPROM) |
|
|
Term
A SIM card serves which of the following purposes? |
|
Definition
- Identifies the subscriber to the network - Stores service-related information - Can be used to back up the device |
|
|
Term
Which of the following is NOT a concern with acquiring mobile devices? |
|
Definition
The following ARE:
- loss of power
- synchronization with cloud services
- remote wiping |
|
|
Term
Which of the following is NOT a way to isolate a mobile device from incoming signals? |
|
Definition
The following ARE:
- Place the device in airplane mode
- Place the device in a paint can
- Use the Paraben Wireless StrongHold Bag
- Turn the device off |
|
|
Term
When isolating a mobile device from incoming signals, the battery drains slower? |
|
Definition
False (it goes into roaming mode so drains fast) |
|
|
Term
The file system of a SIM card is in a hiefarchical structure? |
|
Definition
|
|
Term
There are many free mobile device forensics tools? |
|
Definition
False (Many tools but most aren’t free) |
|
|
Term
Does Apple implement Address Space Layout Randomization (ASLR) in iOS as part of it's security model? |
|
Definition
|
|
Term
When reviewing a forensic copy of an android device, where would we find the contents of the SD card? |
|
Definition
|
|
Term
When reviewing a forensic copy of an android device, where would we find the contents of any encrypted SD card applications? |
|
Definition
|
|
Term
When reviewing a forensic copy of an android device, where would we find all wireless network configuration saved within the device? |
|
Definition
/data/misc/wifi/wpa_supplicant.conf |
|
|
Term
When reviewing a forensic copy of an iOS device, which directory would we look in for access to the voicmail database? |
|
Definition
/private/var/mobile/Library/Voicemail |
|
|
Term
When reviewing a forensic copy of an iOS device, which directory would we look in for information on all application screenshots for review? |
|
Definition
/private/var/mobile/Library/Caches/Snapshots |
|
|
Term
When reviewing a forensic copy of an iOS device, which directory would we look in for information on Mobile Safari browsing history? |
|
Definition
|
|
Term
Which of the following is a feature offered by using a proprietary format? |
|
Definition
- Option to compress or not compress image files - Can split an image into smaller segmented files - Can integrate metadata into the image file |
|
|