Exam 13: Computer Intrusions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A forensic analysis conducted on a forensic duplicate of the system in question is referred to as:

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

C

Investigating computer intrusions usually involves a small amount of digital evidence from only a few sources.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

False

Intruders who have a preferred toolkit that they have pieced together over time, with distinctive features:

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

C

Discuss the difference between automated and dynamic modus operandi, including the kinds of information to look for, and the value of conducting this kind of analysis.

(Essay)
4.8/5
(38)

A computer intruder's method of approach and attack can reveal a significant amount about their:

(Multiple Choice)
4.8/5
(34)

When collecting data from a compromised computer, consideration should be given to collecting the _________data first.

(Multiple Choice)
4.8/5
(33)

If digital investigators find an unauthorized file, they should:

(Multiple Choice)
4.7/5
(30)

Incident Response can be viewed as a subset or part of an intrusion investigation.

(True/False)
4.8/5
(29)

Gathering information about a system through the use of a port scanner is considered a direct attack method.

(True/False)
4.9/5
(29)

Remote forensic solutions can be used to access live systems, and include the ability to:

(Multiple Choice)
4.9/5
(44)

In the case of a computer intrusion, the target computer is:

(Multiple Choice)
4.9/5
(35)

A common technique that is highly useful and can be applied in a computer intrusion investigation is to simply focus on file system activities around the time of known events. This embodies a principle known as:

(Multiple Choice)
4.9/5
(29)

Although new exploits are published daily, it takes skill and experience to break into a computer system, commit a crime, and cover one's tracks.

(True/False)
4.8/5
(34)

Social engineering refers to any attempt to contact legitimate users of the target system and trick them into giving out information that can be used by the intruder to break into the system.

(True/False)
4.9/5
(39)

The forensic examiner needs to be aware that the process of collecting memory:

(Multiple Choice)
4.9/5
(41)

Examining a live system is prone to error, may change data on the system, and may even cause the system to stop functioning.

(True/False)
4.8/5
(38)

Determining skill level can lead to:

(Multiple Choice)
4.7/5
(33)

Capturing all of the network traffic to and from the compromised system can:

(Multiple Choice)
4.9/5
(34)

Why are "non-volatile" storage locations contained in the RFC 8227 "Order of Volatility"?

(Multiple Choice)
4.9/5
(32)

A growing number of intrusions are committed by organized criminal organizations and state-sponsored groups.

(True/False)
4.8/5
(34)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)