Exam 13: Computer Intrusions
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
A forensic analysis conducted on a forensic duplicate of the system in question is referred to as:
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
C
Investigating computer intrusions usually involves a small amount of digital evidence from only a few sources.
Free
(True/False)
4.8/5
(37)
Correct Answer:
False
Intruders who have a preferred toolkit that they have pieced together over time, with distinctive features:
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
C
Discuss the difference between automated and dynamic modus operandi, including the kinds of information to look for, and the value of conducting this kind of analysis.
(Essay)
4.8/5
(38)
A computer intruder's method of approach and attack can reveal a significant amount about their:
(Multiple Choice)
4.8/5
(34)
When collecting data from a compromised computer, consideration should be given to collecting the _________data first.
(Multiple Choice)
4.8/5
(33)
If digital investigators find an unauthorized file, they should:
(Multiple Choice)
4.7/5
(30)
Incident Response can be viewed as a subset or part of an intrusion investigation.
(True/False)
4.8/5
(29)
Gathering information about a system through the use of a port scanner is considered a direct attack method.
(True/False)
4.9/5
(29)
Remote forensic solutions can be used to access live systems, and include the ability to:
(Multiple Choice)
4.9/5
(44)
In the case of a computer intrusion, the target computer is:
(Multiple Choice)
4.9/5
(35)
A common technique that is highly useful and can be applied in a computer intrusion investigation is to simply focus on file system activities around the time of known events. This embodies a principle known as:
(Multiple Choice)
4.9/5
(29)
Although new exploits are published daily, it takes skill and experience to break into a computer system, commit a crime, and cover one's tracks.
(True/False)
4.8/5
(34)
Social engineering refers to any attempt to contact legitimate users of the target system and trick them into giving out information that can be used by the intruder to break into the system.
(True/False)
4.9/5
(39)
The forensic examiner needs to be aware that the process of collecting memory:
(Multiple Choice)
4.9/5
(41)
Examining a live system is prone to error, may change data on the system, and may even cause the system to stop functioning.
(True/False)
4.8/5
(38)
Capturing all of the network traffic to and from the compromised system can:
(Multiple Choice)
4.9/5
(34)
Why are "non-volatile" storage locations contained in the RFC 8227 "Order of Volatility"?
(Multiple Choice)
4.9/5
(32)
A growing number of intrusions are committed by organized criminal organizations and state-sponsored groups.
(True/False)
4.8/5
(34)
Showing 1 - 20 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)