Term
| Which three disciplines make up the "investigations triad"? |
|
Definition
| Vulnerability/Threat Assessment and Risk Management; Network Intrusion Detection and Incident Response; Digital Investigation |
|
|
Term
| Which of the following is an example of hearsay evidence? |
|
Definition
Hearsay: “They guy told me he did it” “He said he knew who did it, and could testify” “I saw a recording of the whole thing go down” A text file containing a personal letter |
|
|
Term
| Which of the following is an example of "Low-Tech" Reconnaissance? |
|
Definition
1. Visiting Target 2. Breaking into Target 3. Dumpster Diving 4. Social Engineering |
|
|
Term
| Which NMAP scan type attempts to complete the 3-way handshake with each scanned port? |
|
Definition
|
|
Term
| A vulnerability is known as the intersection of exploiting a flaw, access to a flaw, and what? |
|
Definition
| System susceptability/flaw |
|
|
Term
|
Definition
| A piece of software, chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware |
|
|
Term
| Malware is code that has an adverse impact on which of the following? |
|
Definition
| Confidentiality, integrity, availability |
|
|
Term
| When a logical condition causes a virus to move from a dormant or propagation phase is which phase? |
|
Definition
|
|
Term
| What ISO standard was ratified for digital forensics in October 2012? |
|
Definition
| ISO 27037 Information Technology - Secuirty Techniques |
|
|
Term
| When did the FBI form the Computer Analysis and Response Team (CART)? |
|
Definition
|
|
Term
| Which US Constitutional Amendment protects everyone's right to be secure from search and seizure? |
|
Definition
|
|
Term
| Digital Evidence is the same as Data Recovery? |
|
Definition
| No, forensics includes retrieving information that was deleted by mistake or lost during a power surge or server crash |
|
|
Term
| Which Digital Evidence role has the skill to analyze the data and determine when another specialist should be called in to assist? |
|
Definition
| Digital Evidence Specialist (DES) |
|
|
Term
| What policy defines rules for using a company's computers and networks? |
|
Definition
|
|
Term
| Which of the following situations are most common for private sector investigations? |
|
Definition
Abuse or misuse of computing assets Email abuse Internet abuse |
|
|
Term
| What do you secure evidence in? |
|
Definition
| Antistatic evidence bags or pads |
|
|
Term
| Which of the following is a basic requirement for setting up your forensics workstation? |
|
Definition
Basic requirements A workstation running necessary OS (usually Windows) A write-blocker device Digital forensics acquisition tool Digital forensics analysis tool Target drive to receive the source or suspect disk data Spare PATA or SATA ports USB ports
Additional useful items Network interface card (NIC) Extra USB ports FireWire 400/800 ports SCSI card Disk editor tool Text editor tool Graphics viewer program Other specialized viewing tools |
|
|
Term
| Which of the following is an example of best evidence? |
|
Definition
Best Evidence: A photo of the crime scene A copy of a signed contract A file recovered from a hard drive A bit-for-bit snapshot of a network transaction (pcap) |
|
|
Term
| Which of the following is an example of digital evidence? |
|
Definition
Digital Evidence Emails and IM sessions Invoices and records of payment received Browser activity, including web-based email Routinely kept access logs /var/log/messages |
|
|
Term
| A bit-by-bit copy of the original storage medium is known as? |
|
Definition
|
|
Term
| A bit-stream copy of all data on a disk or partition is known as? |
|
Definition
| “image” or “image file” or Bit-stream Image |
|
|
Term
| What is the first rule of computer forensics? |
|
Definition
| Preserve the original evidence |
|
|
Term
| Which of the following is an advantage of the RAW format? |
|
Definition
- Fast data transfers - Ignores minor data read errors on source drive - Most computer forensics tools can read raw format |
|
|
Term
| Which of the following is a feature offered by using a proprietary format? |
|
Definition
- Option to compress or not compress image files - Can split an image into smaller segmented files - Can integrate metadata into the image file |
|
|
Term
| Who developed the Advanced Forensics Format? |
|
Definition
| - Dr. Simson L. Garfinkel |
|
|
Term
| Which acquisition method is the most common method and offers the most flexibility? |
|
Definition
| Creating a disk-to-image file |
|
|
Term
| At least how many images of digital evidence should you make for contingency planning purposes? |
|
Definition
|
|
Term
| In order to validate data acquisitions, what utility is required? |
|
Definition
| Hashing algorithm utility |
|
|
Term
| Windows does not have a built-in hashing algorithm tool for forensics? |
|
Definition
|
|
Term
| RIAD 0's biggest disadvantage is? |
|
Definition
|
|
Term
| Which of the following are components of a disk drive? |
|
Definition
- Geometry - Head - Tracks - Cylinders - Sectors |
|
|
Term
| Given 512 bytes per sector, and using a disk with 1024 cylinders, 64 read/write heads and 63 sectors, how large is the disk in GB? |
|
Definition
- 1024 x 64 x 63 = 4,128,768 sectors - 4,128,768 x 512 / sector = 2,113,929,216 - 2.114 GB |
|
|
Term
| It is crucial to make a full forensic copy of a solid-state drive as soon as possible due to what feature? |
|
Definition
|
|
Term
| A partition is known as a ? |
|
Definition
|
|
Term
| The unused space between partitions is known as ? |
|
Definition
|
|
Term
| The Master Boot Record (MBR) is located at sector? |
|
Definition
|
|
Term
| Which of the following is not contained in the File Allocation Table (FAT) database? |
|
Definition
The following ARE contained:
- Filenames
- Directory names
- Date and time stamps
- Starting cluster number
- File attributes |
|
|
Term
| In Microsoft Windows, when a file is deleted which HEX character is used to replace the first letter of the filename? |
|
Definition
|
|
Term
| Which of the following is an improvement NTFS has over FAT file systems? |
|
Definition
- NTFS provides more information about a file - NTFS gives more control over files and folders |
|
|
Term
| On an NTFS disk, the first data set is what? |
|
Definition
|
|
Term
| When reviewing the registry, which file contains the user-specific configuration settings? |
|
Definition
|
|
Term
| When using Volatility to perform memory forensics, which of the following modules provide a list of processes that were running on the computer when the image was taken? |
|
Definition
|
|
Term
| On mobile devices, the Operating System is stored in? |
|
Definition
|
|
Term
| On mobile devices, the system data is stored in? |
|
Definition
| electronically erasable programmable read-only memory (EEPROM) |
|
|
Term
| The file system of a SIM card is in a hiefarchical structure? |
|
Definition
|
|
Term
| There are many free mobile device forensics tools? |
|
Definition
| False (Many tools but most aren’t free) |
|
|
Term
| When reviewing a forensic copy of an android device, where would we find the contents of the SD card? |
|
Definition
|
|
Term
| When reviewing a forensic copy of an iOS device, which directory would we look in for information on Mobile Safari browsing history? |
|
Definition
|
|
Term
| Identifying the date, time, and method of incident discovery is an example of which part of the Network Forensics investigative Methodology? |
|
Definition
|
|
Term
| Planning the initial acquisition and analysis of evidence is an example of which part of the Network Forensics Investigative Methodology? |
|
Definition
|
|
Term
| The Network Forensics Investigative Methodology uses which acronym? |
|
Definition
OSCAR - Obtain Information - Strategize - Collect Evidence - Analyze - Report |
|
|
Term
| Understanding the network topology and organization structure is an example of which part of the Network Forensics |
|
Definition
|
|
Term
| Using the Berkeley Packet Filter, how would we filter onto traffic containing an ip address of 192.168.10.11? |
|
Definition
|
|
Term
| Using the Berkeley Packet Filter, how would we filter onto traffic for the FTP service? |
|
Definition
| dst.port == 21 (or 'ftp') |
|
|
Term
| When analyzing evidence, which of the following best defines correlation? |
|
Definition
| Marrying disparate sources of data from multiple sources |
|
|
Term
| IPFIX succeeded Cisco's NETFLOW and is based on which version? |
|
Definition
| specified in RFC 5101 and based on version 9 of NetFlow. |
|
|
Term
| Is time synchronization an issue when placing a Flow Record Sensor within your network? |
|
Definition
|
|
Term
| When analyzing flow record data, which of the following is not one of the four analysis techniques? |
|
Definition
The 4 analysis techniques ARE: Filtering; Baselining; Dirty Values; Activity Pattern Matching |
|
|
Term
| When collecting evidence, we analyze which pieces of evidence? |
|
Definition
|
|
Term
| Which of the following are sources of network based evidence? |
|
Definition
On the wire In the Air Switches Routers DHCP Servers Name Servers Authentication Servers NIDS/NIPS Web Proxies Application Servers Central Log Servers Honeynets |
|
|
Term
| Which components of the Flow Record Processing System is used to analyze the evidence collected from one or multiple servers? |
|
Definition
- Aggregator: Central server that is used for multiple collectors
Analysis: Once the data has been collected and stored, it can be analyzed using a variety of commercial, open-source, and homegrown tools |
|
|
Term
| A wireless 802.11 frame for Management frames is type? |
|
Definition
| Type 0 - These include probes, beacons, authentications, associations, and others |
|
|
Term
| In a wireless network, spoofing is not trivial? |
|
Definition
|
|
Term
| A single NIDS or NIPS sensor can monitor many hosts? |
|
Definition
|
|
Term
| A Switched Port Analyzer (SPAN) is used in which deployment? |
|
Definition
| Promiscuous Mode - IDS (detection) |
|
|
Term
| Which of the following is not a type of network attack that a NIDS/NIPS detects/protects against? |
|
Definition
he 3 types of attack that NIDS/NIPS DOES protect against are: Reconnaissance; Access; Denial-of-service |
|
|
Term
| A NIPS deployment utilizes its sensor in "inline" mode? |
|
Definition
|
|
Term
| A NIDS relies on a piece of software (agent) installed on each system? |
|
Definition
| False (HIDS/HIPS rely on these) |
|
|
Term
| Which of the following contains details regarding illicit connections or attempts? |
|
Definition
|
|
Term
| Which of the following is the most widely used NIDS? |
|
Definition
|
|
Term
| Profile based NIDS are NOT subject to a high number of false-positives? |
|
Definition
|
|
Term
| Which NIDS is also known as Misuse Detection? |
|
Definition
|
|
Term
| Which of the following is not a type of evidence we can collect from a NIDS/NIPS? |
|
Definition
The following ARE types of evidence: Configuration Alert data Packet header and/or flow records Packet payloads Activities correlated accross multiple sensors |
|
|
Term
| Which NIDS operates similar to how most antivirus software detects malware? |
|
Definition
|
|
Term
| The snort/rules/ directory contains the global configuration file for network values, preprocessor rules, and output information? |
|
Definition
| False - (it is the directory of all rule files specific that are used) |
|
|
Term
| In reviewing Squid proxy logs, which of the following files provide us with the web history for that server? |
|
Definition
| access.log (web access history) |
|
|
Term
| Which of the following is a proxy type that inspects the content of web traffic and filters based on keywords, presence of malware, etc.? |
|
Definition
|
|
Term
| A signature based NIDS monitors packets and compares them against a database of signatures? |
|
Definition
|
|
Term
| Which caching mechanism is implemented through the cache-control field? |
|
Definition
|
|
Term
| Which RFC pertains to the caching of HTTP1.1? |
|
Definition
|
|
Term
| After an internal system may have downloaded malicious content via the web, which of the following systems would you look at for evidence? |
|
Definition
|
|
Term
| Cached content of web traffic stored on disk is consider which type of evidence from a proxy server? |
|
Definition
|
|
Term
| Dynamically scanning web objects for viruses and malware is a feature of which form of filtering? |
|
Definition
|
|
Term
| Which of the following are protocols related to the use of a Distributed Caching proxy? |
|
Definition
Internet Cache Protocol (ICP) Internet Content Adaptation Protocol (ICAP) |
|
|
Term
| In reviewing Squid proxy logs, which of the following files provide us access to information about the client browsers? |
|
Definition
|
|
Term
| Which caching mechanism is implemented through the use of the Entity Tag (Etag)? |
|
Definition
|
|
Term
| The history of all HTTP or HTTPS traffic passed through a proxy server is considered which evidence type? |
|
Definition
|
|
Term
| Which caching mechanism is implemented through the Last-Modified header? |
|
Definition
|
|
Term
| The use of whitelists or blacklists is a feature of which form of filtering? |
|
Definition
|
|
Term
| Which of the following is a proxy type that acts as an intermediary to protect the identities of web surfers? |
|
Definition
|
|
Term
| Which of the following is a proxy type that stores the previously used web pages to speed up performance? |
|
Definition
|
|
Term
| Which of the following is NOT a type of firewall? |
|
Definition
Firewall types ARE: Packet Filter; Session-Layer Proxy; Application Proxy; Enterprise; Consumer; Roll-Your-Own |
|
|
Term
| Which network log architecture provides the easiest method for collecting logs? |
|
Definition
|
|
Term
| Time skew is best addressed under which form of network log architecture? |
|
Definition
|
|
Term
| When implementing Remote Network Logging, which of the following is NOT an area of concern? |
|
Definition
The following ARE: Reliability; Time skew; Confidentiality; Integrity |
|
|
Term
| Utilizing TLS/SSL addresses which concern with remote network log collection? |
|
Definition
| Confidentiality (maybe also Integrity) |
|
|
Term
| Routers contain which of the following volatile evidence that can assist in an investigation to identify a system on the network? |
|
Definition
Routing tables; ARP table; ACLs; DHCP leases; IO; running configuration; flow data |
|
|
Term
| Utilizing NTP addresses which concern with remote network log collection? |
|
Definition
|
|
Term
| Switches contain which of the following volatile evidence that can assist in an investigation to identify a system on the network? |
|
Definition
Stored packets prior to forwarding; CAM table; ARP table; ACLs; IO; running configuration; flow data |
|
|
Term
| Which of the following is NOT a method for propagation of malware? |
|
Definition
Propagation methods ARE: Email; Web links and content; Network shares; Direct Network Exploitation |
|
|
Term
| Which tool below is an open source tool designed to tunnel IPv4 data through a DNS server and is named after the atomic number 53? |
|
Definition
|
|
Term
| Transport Layer Security (TLS) operates at the transport layer in the OSI model? |
|
Definition
| False - TLS provides session layer (layer 5) encryption and authentication |
|
|
Term
| VLAN trunking provides support for how many different VLANS? |
|
Definition
| 4096 different (virtual LANs) VLANs |
|
|
Term
| Which of the following is a legitimate use of a network tunnel? |
|
Definition
Aggregating network traffic across “virtual circuits”; Provide a layer of encryption for data in transit |
|
|
Term
| Which proprietary format encapsulates Ethernet frames prior to being sent over a WAN? |
|
Definition
|
|
Term
| Which of the following is NOT a method for Command and Control Communications of malware? |
|
Definition
Malware C2 communications methods ARE: HTTP; Social Networking sites; Peer-to-peer; IFC; Cloud computing |
|
|
Term
| In an IPSec tunnel, which mode encapsulates the entire original IP packet within a new IP packet which prevents inspection/analysis of the information? |
|
Definition
|
|
Term
| After negotiation and key generation using the IKE protocol, what is the next step in establishing Security Associations (SA's)? |
|
Definition
| 2. Authentication Header (AH) to provide node to node authentication and integrity |
|
|
Term
| Which of the following allows for tunneling IPv6 traffic over IPv4 traffic? |
|
Definition
| Teredo - Tunnel IPv6 traffic over UDP over IPv4 |
|
|
Term
| Which payload behavior of malware is also a method of propagation? |
|
Definition
|
|
Term
| Which of the following is an alternative to ISL? |
|
Definition
| Generic Routing Encapsulation (GRE) |
|
|
Term
| In which phase of the attack methodology do we correlate open ports and running services to a potential attack vector? |
|
Definition
| Phase #3. Vulnerability identification |
|
|
Term
| Which of the following is NOT a concern with acquiring mobile devices? |
|
Definition
"The following ARE concerns: - loss of power - synchronization with cloud services - remote wiping" |
|
|