Indication Analysis Flashcards

(19 cards)

1
Q

Joint Test Action Group (JTAG)

A

A hardware interface standard used primarily for testing and debugging embedded systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Non-Volatile Storage

A

Like hard drives, holds permanent data and is analyzed through forensic imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Order of Volatility

A

Sequence in which digital evidence should be collected during a forensic investigation
Registers and CPU cache
Routing tables, ARP cache, process tables, kernel statistics, and RAM
Temporary file systems or swap space
Disks
Remote logging and monitoring data
Physical configurations and network topologies
Archival media such as backup tapes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Forensic Imaging

A

Process of creating an exact bit-by-bit copy of digital data from a storage device to preserve its integrity for use in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Slack Space

A

Unused space between a file’s end and the storage unit’s end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

dd

A

Native to Unix/Linux systems, creates a bit-by-bit copy of a storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

dcfldd

A

Forensic version of the dd command, was developed by the US Department of DCFL to enhance dd for forensic data acquisition and secure wiping
Includes on the fly hashing and progress indicators for forensic work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FTK Imager

A

Creates bit-by-bit copies, automates hash generation, and ensures data integrity of both the original and the copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reverse Engineering

A

Breaks down software or hardware components to understand their structure, functionality, and potential vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Byte Code

A

Low-level representation of code that can be executed by virtual machines
Acts as an intermediate form between high-level programming and machine code for platform independent execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Binary Code

A

Machine-level code that the computer directly executes and is made up of ones and zeroes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disassembly

A

Process of converting binary code into assembly language to analyze how the software operates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Decompilation

A

Translates executable code into a higher-level language for easier understanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

binwalk

A

Inspects firmware images to extract components like archives, file systems, and executable code for reverse engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hexdump

A

Used to display binary files in a human-readable hexadecimal format, allowing analysts to examine the structure and content of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

strace

A

Tracks system calls by a running binary, revealing system interactions and suspicious actions like unauthorized file access

17
Q

ldd

A

Identifies shared libraries a binary relies on to understand dependencies and detect malicious modifications

18
Q

Incident Response Process

A

Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity