Digital Forensics Flashcards

Day11_Incident Response Activities & Incident Response Communication (35 cards)

1
Q

You need to acquire a disk image from a suspect’s computer. Which device should you use to protect the integrity of the source disk?

A

Write blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is write-blocking?

A

Write-blocking a method to prevent changes to the original source data

It can be implemented through hardware devices or software components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false: Write-blocking can only be achieved through hardware devices.

A

FALSE

Write-blocking can also be a software component that prevents writing back to the original source data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which method is used to verify that source disk evidence has not been modified?

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to the order of volatility, which evidence should be acquired first?

A

Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of chain of custody?

A

Prevent evidence tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is digital forensics defined as?

A

The application of computer science and data recovery for legal purposes

Digital forensics involves specific techniques to ensure proper governance of acquired digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What must be ensured about any acquired digital evidence?

A

It must not be tampered with

If the evidence is potential legal evidence, it needs to be made admissible in a court of law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the first step in the digital forensics process?

A

Gathering of evidence

This step is crucial for the integrity of the digital forensics investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or false: The stakes are low when handling potential legal evidence in digital forensics.

A

FALSE

The stakes are high because the evidence needs to be admissible in a court of law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is responsible for evidence gathering in digital forensic investigations?

A

digital forensic technicians

They may also act as first responders in digital or cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is crucial to do when working with digital data?

A

Always work from a copy of the digital data

This is essential to preserve the integrity of the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What process is used to create a copy of the source storage devices?

A

imaging or cloning

This ensures that the original data remains unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give an example of gathering evidence in digital forensics.

A
  • Removing batteries
  • Turning off a suspect mobile phone

These actions help preserve the integrity of the evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is required for the acquisition of digital evidence?

A
  • Right equipment
  • Knowledge of usage
  • Adherence to chain of custody rules

Law enforcement and private investigation firms employ digital forensics analysts with dedicated workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a hard drive imaging machine used for?

A

To copy the contents of one hard disk to another without making changes

It is crucial for maintaining the integrity of the source information in the chain of custody.

17
Q

True or false: Hard drive imaging hardware is typically slower than software drive imaging tools.

A

FALSE

Hardware is usually faster and more stable than software equivalents.

18
Q

What is a potential trade-off when using hard drive imaging hardware?

A

Compatibility issues with newer drives and their disk interfaces

This can affect the choice between hardware and software imaging tools.

19
Q

What do software drive imaging tools require to function?

A

Software drive imaging tools require access to the storage device via an operating system

They run as apps within systems like Windows or Linux.

20
Q

What are mobile device acquisition tools used for?

A

Mobile device acquisition tools are used to retrieve data from devices like smartphones

They often connect via USB ports to access data from components like SIM cards.

21
Q

What is the function of an external hardware write blocker?

A

Provides read access only to the suspect storage device

It ensures that the original storage device and its files are not modified.

22
Q

What connects the write blocker to the suspect storage device?

A

Data cable (e.g., eSATA, USB, SATA, Firewire)

This connection allows the digital forensic workstation to mount and copy data from the suspect device.

23
Q

What is the purpose of a digital forensic workstation?

A

To properly gather evidence using the correct hardware and software

It can be a laptop or a desktop equipped with specialized forensic tools.

24
Q

What type of software might be installed on a digital forensic workstation for evidence gathering?

A
  • Data recovery tools
  • Memory capture tools
  • Hard drive imaging software

These tools are essential for analyzing suspect devices and recovering deleted files.

25
True or false: A write blocker allows read and write access to the suspect storage device.
FALSE ## Footnote The write blocker provides read-only access to prevent any modifications.
26
What is generated to verify the accuracy of a disk image during acquisition?
A unique hash of the drive contents ## Footnote Identical hashes indicate that the copy is accurate.
27
What mode are suspect disk partitions mounted in on a digital forensic workstation?
Read-only mode ## Footnote This prevents any changes to the original data during analysis.
28
What must be thoroughly documented to remain compliant with **chain of custody**?
The entire process of evidence acquisition and analysis ## Footnote Documentation is crucial for legal integrity and validation of the evidence.
29
What type of data can be particularly challenging to access in digital forensics?
Data on smartphones ## Footnote Smartphones often have security features that complicate data retrieval.
30
Define IoCs
IoCs are early warning signs of a security incident ## Footnote Examples of IoCs include: * unusualnetwork traffic * system anomalies * unexpected file changes
31
What are the (4) phases of a forensic investigation?
The (4) phases are: 1. Identification 2. Collection 3. Analysis 4. Reporting (presentation)
32
Define **Legal Hold**
**Legal Hold** a directive to preserve potentially relevant data for legal purposes ## Footnote * Failure to comply with legal hold orders can result in legal consequences * Legal teams play a crucial role in issuing legal hold orders
33
What is remediation?
**Remediation** focuses on eliminating the root cause of the incident ## Footnote Actions may include applying patches, removing malware, or fixing vulnerabilities | **It** aims to prevent a recurrence of the same incident
34
***T*** or ***F***: Determining the scope involves identifying affected systems and data
True ## Footnote It helps set the boundaries for incident response efforts | **The** scope may expand as investigations progress
35
Define **Stakeholders**
***Stakeholders*** any individual, group, or organization that can affect, be affected by, or perceive itself to be affected by a decision, activity, or outcome relating to an incident