Shared Flashcard Set

Details

Digital Forensics
CYBR 691 Midterm Questions
120
Computer Networking
Graduate
06/25/2018

Additional Computer Networking Flashcards

 


 

Cards

Term
Which three disciplines make up the "investigations triad"?
Definition
Vulnerability/Threat Assessment and Risk Management; Network Intrusion Detection and Incident Response; Digital Investigation
Term
Which of the following is an example of hearsay evidence?
Definition
Hearsay:
“They guy told me he did it”
“He said he knew who did it, and could testify”
“I saw a recording of the whole thing go down”
A text file containing a personal letter
Term
In which phase of the attack methodology do we try to identify hosts that we can then look for vulnerabilities on?
Definition
Phase #2. Scanning
Term
In which phase of the attack methodology do we use google and social media to learn about our target?
Definition
Phase #1. Recon/OS Intel
Term
In which phase of the attack methodology do we correlate open ports and running services to a potential attack vector?
Definition
Phase #2. Scanning
Term
In which phase of the attack methodology do we actually "break in" to a system?
Definition
Phase #4. Privilege Escalation/
Exploitation
Term
Which of the following is an example of Technical Reconnaissance?
Definition
1. Social Engineering
2. Registration Info
3. Open Source Intel
4. OSINT via Social Media
Term
Which of the following is an example of "Low-Tech" Reconnaissance?
Definition
1. Visiting Target
2. Breaking into Target
3. Dumpster Diving
4. Social Engineering
Term
Baiting is an example of Social Engineering using?
Definition
USB/CD/DVD
Term
Pretending to be a vendor or recruiter and calling a target is an example of?
Definition
Social Engineering
Term
The Domain Name Registration records provide which of the following?
Definition
1. Administrative info on the target
2. Points of contact
3. Domain expiration date
Term
Open Source Intelligence requires us to access the target systems directly?
Definition
False
Term
Shodan is an example of?
Definition
Open Source Intel (OSINT)
Term
Which of the following is the best search engine to find all Linksys WRT54G routers attached to the internet?
Definition
Shodan
Term
Bing can be BEST used to identify?
Definition
IP Address Co-Location
Term
In TCP/IP, what is the correct way to open a connection to a remote system using the 3-way handshake?
Definition
1. Send SYN
2. Rec. SYN, send SYN-ACK
3. Rec SYN-ACK, Send ACK
Term
In TCP/IP, what is the correct way to close a connection with a remote system using the 3-way handshake?
Definition
1. 1st app sends FIN (active close)
2. 2nd app rec's SYN, sends ACK (passive close)
3. 1st app rec's ACK
4. Later, 2nd app send FIN (active close)
5. 1st app rec's FIN, sends ACK
6. 2nd app rec's ACK
Term
Which NMAP scan type attempts to complete the 3-way handshake with each scanned port?
Definition
TCP Connect (-sT)
Term
Which NMAP scan type only sends the initial SYN request and waits for an ACK to detect the open port?
Definition
TCP SYN (-sS)
Term
Which NMAP scan type allows an attacker to get past some packet filtering devices?
Definition
TCP ACK (-sA)
Term
Which of the following NMAP command line strings will scan a target for specific web ports, and perform version detection of those ports?
Definition
TCP ACK (-sA)
Term
A vulnerability is known as the intersection of which three elements?
Definition
1. System susceptability/flaw
2. Access to the flaw
3. Exploitation of the flaw
Term
A vulnerability is known as the intersection of exploiting a flaw, access to a flaw, and what?
Definition
System susceptability/flaw
Term
Which of the following is a publicly available vulnerability list?
Definition
1. US-CERT
2. SANS ISC
3. SANS Top 20
4. Vendor Advisories
5. NIST Vulnerability Database
6. Mitre CVE Database
7. Open Source Vulnerability Database
Term
What is an exploit?
Definition
A piece of software, chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware
Term
Which of the following are types of exploits?
Definition
1. Remote (runs over a network)
2. Local (runs directly on victim)
3. Client Side (runs on client, such as browser or other application)
Term
Core Impact is an example of what?
Definition
an exploit framework/penetration testing suite
Term
Exploit-DB is a resource to find?
Definition
fully functional exploits
Term
Packet Storm is a resource to find?
Definition

fully functional exploits, proof-of-concept code

 

Term
Who created Metasploit?
Definition
started in 2003 by HD Moore
Term
Metasploit was originally written in which programming language?
Definition
Perl
Term
Metasploit was ported to which programming language in 2006?
Definition
Ruby
Term
Which company purchased Metasploit in 2009?
Definition
Rapid 7
Term
What is the name of the Graphical Front End to Metasploit?
Definition
MSFConsole
Term
Malware is code that has an adverse impact on which of the following?
Definition
Confidentiality, integrity, availability
Term
Malicious code triggered by user action is an example of what?
Definition
virus
Term
What phase of a virus is when it is replicating iteself?
Definition
propagation
Term
What phase of a virus is when it performs its malicious action or payload?
Definition
action
Term
When a logical condition causes a virus to move from a dormant or propagation phase is which phase?
Definition
triggering
Term
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself is a?
Definition
worm
Term
Conficker is an example of which malware?
Definition
worm
Term
Which malware is named after ancient Greek history?
Definition
trojan horse
Term
What malware modified an operating system to hide the existence of itself or other malware?
Definition
rootkit
Term
What ISO standard was ratified for digital forensics in October 2012?
Definition
ISO 27037 Information Technology - Secuirty Techniques
Term
The Federal Rules of Evidence (FRE) was created to ensure what?
Definition
consistency in federal proceedings (many states base laws on the FRE)
Term
When did the FBI form the Computer Analysis and Response Team (CART)?
Definition
1984
Term
Which US Constitutional Amendment protects everyone's right to be secure from search and seizure?
Definition
4th Amendment
Term
Investigating digital devices include?
Definition
Collecting data securely; examining suspect data to edetermine details such as origin and content; presenting digital information to courts; applying laws to digital device practices
Term
Digital Evidence is the same as Data Recovery?
Definition
No, forensics includes retrieving information that was deleted by mistake or lost during a power surge or server crash
Term
Which Digital Evidence role arrives on the incident scene assesses the situation, and takes precautions to acquire and preserve evidence?
Definition
Digital Evidence First Responder (DEFR)
Term
Which Digital Evidence role has the skill to analyze the data and determine when another specialist should be called in to assist?
Definition
Digital Evidence Specialist (DES)
Term
What policy defines rules for using a company's computers and networks?
Definition
Acceptable Use Policy
Term
How can a business avoid litigation and inform end users that the organization reserves the right to inspect computer systems and network traffic at will?
Definition
Business displays a warning banner that says the system owner reserves the right to inspect and monitor use and there should be no expectation of privacy
Term
Which of the following situations are most common for private sector investigations?
Definition
Abuse or misuse of computing assets
Email abuse
Internet abuse
Term
The route evidence takes from the time it is found until the case is closed or goes to court is called?
Definition
Chain of custody
Term
What do you secure evidence in?
Definition
Antistatic evidence bags or pads
Term
Which of the following would you use to secure your evidence?
Definition
Locker in digital lab facility/Forensic workstation
Term
Which of the following is a basic requirement for setting up your forensics workstation?
Definition
Basic requirements
A workstation running necessary OS (usually Windows)
A write-blocker device
Digital forensics acquisition tool
Digital forensics analysis tool
Target drive to receive the source or suspect disk data
Spare PATA or SATA ports
USB ports

Additional useful items
Network interface card (NIC)
Extra USB ports
FireWire 400/800 ports
SCSI card
Disk editor tool
Text editor tool
Graphics viewer program
Other specialized viewing tools
Term
How often should you plan to schedule equipment upgrades in your forensics lab?
Definition
Plan on every 18 months, preferably every 12 months
Term
Which of the following is an example of best evidence?
Definition
Best Evidence:
A photo of the crime scene
A copy of a signed contract
A file recovered from a hard drive
A bit-for-bit snapshot of a network transaction (pcap)
Term
Which of the following is an example of business records?
Definition
Business Records
Contracts and other employment agreements
Invoices and records of payment received
Routinely kept access logs
/var/log/messages
Term
Which of the following is an example of circumstantial evidence?
Definition
Circumstantial Evidence:
An email signature
file containing password hashes on the defendant’s computer
The serial number of the USB device
Term
Which of the following is an example of digital evidence?
Definition
Digital Evidence
Emails and IM sessions
Invoices and records of payment received
Browser activity, including web-based email
Routinely kept access logs
/var/log/messages
Term
Which of the following is an example or real evidence?
Definition
Real Evidence:
Murder weapon
Fingerprint/footprint
Signed paperwork or contract
Physical hard drive or USB device
Computer itself
Term
A bit-by-bit copy of the original storage medium is known as?
Definition
Bit-stream copy
Term
A bit-stream copy of all data on a disk or partition is known as?
Definition
“image” or “image file” or Bit-stream Image
Term
What is the first rule of computer forensics?
Definition
Preserve the original evidence
Term
Which of the following is not a storage format for digital evidence?
Definition

The following ARE:

- Raw format

- Proprietary formats

- Advanced Forensics Format (AFF)

Term
Which of the following is an advantage of the RAW format?
Definition
- Fast data transfers
- Ignores minor data read errors on source drive
- Most computer forensics tools can read raw format
Term
Which of the following is a disadvantage of the RAW format?
Definition
- Requires as much storage as original disk or data
- Tools might not collect marginal (bad) sector
Term
Which of the following is a disadvantage of using a proprietary format?
Definition
- Inability to share an image between different tools
- File size limitation for each segmented volume
Term
Who developed the Advanced Forensics Format?
Definition
- Dr. Simson L. Garfinkel
Term
Is the Advanced Forensics Format open source?
Definition
Yes
Term
Which acquisition method is the most common method and offers the most flexibility?
Definition
Creating a disk-to-image file
Term
Sparse acquisition has which of the following characteristics?
Definition
Can take several hours
- Logical acquisition captures only specific files of interest
- Sparse acquisition collects fragments of unallocated (deleted) data
- For large disks
- PST or OST mail files, RAID servers
Term
At least how many images of digital evidence should you make for contingency planning purposes?
Definition
At least 2
Term
In order to validate data acquisitions, what utility is required?
Definition
Hashing algorithm utility
Term
Windows does not have a built-in hashing algorithm tool for forensics?
Definition
True
Term
RIAD 0's biggest disadvantage is?
Definition
Lack of Redundancy
Term
RAID 1 is less expensive than RAID 0?
Definition
FALSE
Term
RAID 5 is similar to which of the following RAIDs?
Definition
RAID 0 and RAID 3
Term
Which of the following are components of a disk drive?
Definition
- Geometry
- Head
- Tracks
- Cylinders
- Sectors
Term
Given 512 bytes per sector, and using a disk with 1024 cylinders, 64 read/write heads and 63 sectors, how large is the disk in GB?
Definition
- 1024 x 64 x 63 = 4,128,768 sectors
- 4,128,768 x 512 / sector = 2,113,929,216
- 2.114 GB
Term
It is crucial to make a full forensic copy of a solid-state drive as soon as possible due to what feature?
Definition
Flash wear-levelling
Term
A partition is known as a ?
Definition
Logical Drive
Term
The Windows OS assigns logical addresses to ?
Definition
Clusters
Term
Physical addresses refer to ?
Definition
Sector Numbers
Term
The unused space between partitions is known as ?
Definition
Partition Gap
Term
The Master Boot Record (MBR) is located at sector?
Definition
Sector 0
Term
The File Allocation Table (FAT) database is typically written to a disk's innermost track?
Definition
False (Outermost Track)
Term
Which of the following is not contained in the File Allocation Table (FAT) database?
Definition
- Filenames
- Directory names
- Date and time stamps
- Starting cluster number
- File attributes
Term
Unused space in a cluster between the end of an active file and the end of the cluster is known as?
Definition
Drive Slack
Term
In Microsoft Windows, when a file is deleted which HEX character is used to replace the first letter of the filename?
Definition
E5
Term
Which of the following is an improvement NTFS has over FAT file systems?
Definition
- NTFS provides more information about a file
- NTFS gives more control over files and folders
Term
On an NTFS disk, the first data set is what?
Definition
Partition Boot Sector
Term
Records in the NTFS Master File Tabe is called?
Definition
Metadata
Term
When reviewing the registry, which file contains the computer's security settings?
Definition
Windows\system32\config\Security.dat
Term
When reviewing the registry, which file contains the user-specific configuration settings?
Definition
Ntuser.dat
Term
Firefox stores its information in what?
Definition
SQLite databases
Term
What table would you reference to uncover visited URLs from a Firefox browser?
Definition
moz_places
Term
What table would you reference to uncover typed data from a user in a Firefox browser?
Definition
moz_inputhistory
Term
EXIF data was originally developed for which image format?
Definition
JPG or JPEG
Term
When using Volatility to perform memory forensics, which of the following modules provide a list of processes that were running on the computer when the image was taken?
Definition
psxview/psscan/pstree
Term
When using Volatility to perform memory forensics, what module can be used to reveal any keyboard information typed into the computer at bootup?
Definition
bioskbd
Term
On mobile devices, the Operating System is stored in?
Definition
ROM – Nonvolatile memory
Term
On mobile devices, the system data is stored in?
Definition
electronically erasable programmable read-only memory (EEPROM)
Term
A SIM card serves which of the following purposes?
Definition
- Identifies the subscriber to the network
- Stores service-related information
- Can be used to back up the device
Term
Which of the following is NOT a concern with acquiring mobile devices?
Definition

The following ARE:

- loss of power

- synchronization with cloud services

- remote wiping

Term
Which of the following is NOT a way to isolate a mobile device from incoming signals?
Definition

The following ARE:

- Place the device in airplane mode

- Place the device in a paint can

- Use the Paraben Wireless StrongHold Bag

- Turn the device off

Term
When isolating a mobile device from incoming signals, the battery drains slower?
Definition
False (it goes into roaming mode so drains fast)
Term
The file system of a SIM card is in a hiefarchical structure?
Definition
1
Term
There are many free mobile device forensics tools?
Definition
False (Many tools but most aren’t free)
Term
Does Apple implement Address Space Layout Randomization (ASLR) in iOS as part of it's security model?
Definition
Yes
Term
When reviewing a forensic copy of an android device, where would we find the contents of the SD card?
Definition
/mnt/sdcard
Term
When reviewing a forensic copy of an android device, where would we find the contents of any encrypted SD card applications?
Definition
/mnt/secure/asex
Term
When reviewing a forensic copy of an android device, where would we find all wireless network configuration saved within the device?
Definition
/data/misc/wifi/wpa_supplicant.conf
Term
When reviewing a forensic copy of an iOS device, which directory would we look in for access to the voicmail database?
Definition
/private/var/mobile/Library/Voicemail
Term
When reviewing a forensic copy of an iOS device, which directory would we look in for information on all application screenshots for review?
Definition
/private/var/mobile/Library/Caches/Snapshots
Term
When reviewing a forensic copy of an iOS device, which directory would we look in for information on Mobile Safari browsing history?
Definition
Safari/History.plist
Term
Which of the following is a feature offered by using a proprietary format?
Definition
- Option to compress or not compress image files
- Can split an image into smaller segmented files
- Can integrate metadata into the image file
Supporting users have an ad free experience!