Deck 24: Forensic Techniques

ملء الشاشة (f)
exit full mode
سؤال
The ____ file is used by the system to assist with virtual memory paging and is quite large.

A)Hiberfil.sys
B)IO.sys
C)Virtfile.sys
D)Pagefile.sys
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Each RP folder contains a set of files that were changed since the last Restore Point.
سؤال
A forensic examiner must be familiar with the structure and operation of different file systems and operating systems.
سؤال
A ____ of a hard disk is a bit by bit duplicate,including the boot sector,the partition table,all partitions,hidden files,bad sectors,and even the unallocated space on the hard drive.

A)usable copy
B)forensic copy
C)bit copy
D)file copy
سؤال
The printer spool files will have extensions of ____.

A).ips and .ipl
B).spl and .ips
C).spl and .shd
D).spl and .splx
سؤال
The FAT stores files in dynamic chains of ____________________.
سؤال
The ____ file is used when Windows goes into hibernation.

A)Hiberfil.sys
B)Pagefile.sys
C)IO.sys
D)BOOT.INI
سؤال
Information that is transferred to an external device should also have a(n)____ calculated to verify integrity during collection and at a later date.

A)MD5 hash
B)RC4 hash
C)DES hash
D)RSA hash
سؤال
A ____ contains a copy of the Registry that existed at the time the Restore Point was created.

A)snapshot folder
B)registry directory
C)hive folder
D)revert folder
سؤال
____ will search through a file or folder and report on all the ASCII strings it finds.

A)Ascii.exe
B)Strings.exe
C)Names.exe
D)Parse.exe
سؤال
The first thing you want to do before analyzing network traffic is make sure you have permission to look at it.
سؤال
Working with the Registry is easy for the inexperienced user.
سؤال
____ is a very common file system used by computers and is supported by many different operating systems.

A)File Allocation Table
B)File Arrangement Table
C)File Allocation Tree
D)File Attribute Tree
سؤال
The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.
سؤال
____________________ tools are programs designed to look at specific data structures within the operating system.
سؤال
A network of honeypots is called a(n)____________________.
سؤال
The ____ provides the platform on which computer hardware is managed and made available to the computer software applications.

A)application software
B)network software
C)operating system
D)router software
سؤال
The ____________________ contains items that were recently deleted from a Windows computer system.
سؤال
Using the System Reset tool a Restore Point may be chosen and the system returned back to that point in time.
سؤال
A ____ is a hardware device or software program designed to prevent any write operations from taking place on the original media.

A)read-blocker
B)selective write filter
C)selective filter
D)write-blocker
سؤال
List the skills that you need to become proficient at analyzing malware.
سؤال
List the steps in the incident response process.
سؤال
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
The part of a cluster that is not used when a file is written to it
سؤال
List five laws that have been put into effect to help monitor and control the use of electronic communication systems and computers as well as provide guidelines for prosecution of computer and information-related crimes.
سؤال
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
A computer that is made deliberately vulnerable in order to make it attractive to hackers
سؤال
What is the pre-incident preparation that must take place for a CSIRT?
سؤال
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
A symbolic representation of a family of strings that can be generated from the expression
سؤال
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
A group of individuals at an organization responsible for detecting,investigating,solving,and documenting computer security incidents
سؤال
List UNIX/Linux systems files that are of particular interest to the forensic examiner.
سؤال
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
A snapshot of the state of the system at a point in time
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 24: Forensic Techniques
1
The ____ file is used by the system to assist with virtual memory paging and is quite large.

A)Hiberfil.sys
B)IO.sys
C)Virtfile.sys
D)Pagefile.sys
D
2
Each RP folder contains a set of files that were changed since the last Restore Point.
True
3
A forensic examiner must be familiar with the structure and operation of different file systems and operating systems.
True
4
A ____ of a hard disk is a bit by bit duplicate,including the boot sector,the partition table,all partitions,hidden files,bad sectors,and even the unallocated space on the hard drive.

A)usable copy
B)forensic copy
C)bit copy
D)file copy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
The printer spool files will have extensions of ____.

A).ips and .ipl
B).spl and .ips
C).spl and .shd
D).spl and .splx
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
The FAT stores files in dynamic chains of ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ file is used when Windows goes into hibernation.

A)Hiberfil.sys
B)Pagefile.sys
C)IO.sys
D)BOOT.INI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
Information that is transferred to an external device should also have a(n)____ calculated to verify integrity during collection and at a later date.

A)MD5 hash
B)RC4 hash
C)DES hash
D)RSA hash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
A ____ contains a copy of the Registry that existed at the time the Restore Point was created.

A)snapshot folder
B)registry directory
C)hive folder
D)revert folder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ will search through a file or folder and report on all the ASCII strings it finds.

A)Ascii.exe
B)Strings.exe
C)Names.exe
D)Parse.exe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
The first thing you want to do before analyzing network traffic is make sure you have permission to look at it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
Working with the Registry is easy for the inexperienced user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
____ is a very common file system used by computers and is supported by many different operating systems.

A)File Allocation Table
B)File Arrangement Table
C)File Allocation Tree
D)File Attribute Tree
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
____________________ tools are programs designed to look at specific data structures within the operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
A network of honeypots is called a(n)____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
The ____ provides the platform on which computer hardware is managed and made available to the computer software applications.

A)application software
B)network software
C)operating system
D)router software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ____________________ contains items that were recently deleted from a Windows computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
Using the System Reset tool a Restore Point may be chosen and the system returned back to that point in time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
A ____ is a hardware device or software program designed to prevent any write operations from taking place on the original media.

A)read-blocker
B)selective write filter
C)selective filter
D)write-blocker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
List the skills that you need to become proficient at analyzing malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
List the steps in the incident response process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
The part of a cluster that is not used when a file is written to it
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
List five laws that have been put into effect to help monitor and control the use of electronic communication systems and computers as well as provide guidelines for prosecution of computer and information-related crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
A computer that is made deliberately vulnerable in order to make it attractive to hackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
What is the pre-incident preparation that must take place for a CSIRT?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
A symbolic representation of a family of strings that can be generated from the expression
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
A group of individuals at an organization responsible for detecting,investigating,solving,and documenting computer security incidents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
List UNIX/Linux systems files that are of particular interest to the forensic examiner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
MATCHING
Match each item with a statement below.
a.Restore Point
d.Slack space
b.CSIRT
e.Honeypot
c.Regular expression
A snapshot of the state of the system at a point in time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.