Exam 24: Forensic Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Each RP folder contains a set of files that were changed since the last Restore Point.

(True/False)
4.9/5
(31)

List the skills that you need to become proficient at analyzing malware.

(Essay)
4.8/5
(32)

What is the pre-incident preparation that must take place for a CSIRT?

(Essay)
4.9/5
(33)

A ____ of a hard disk is a bit by bit duplicate,including the boot sector,the partition table,all partitions,hidden files,bad sectors,and even the unallocated space on the hard drive.

(Multiple Choice)
4.9/5
(45)

The ____ file is used when Windows goes into hibernation.

(Multiple Choice)
4.7/5
(32)

Match each item with a statement below. -A symbolic representation of a family of strings that can be generated from the expression

(Multiple Choice)
4.7/5
(23)

A network of honeypots is called a(n)____________________.

(Short Answer)
4.9/5
(31)

The first thing you want to do before analyzing network traffic is make sure you have permission to look at it.

(True/False)
4.8/5
(36)

List UNIX/Linux systems files that are of particular interest to the forensic examiner.

(Essay)
4.9/5
(41)

A forensic examiner must be familiar with the structure and operation of different file systems and operating systems.

(True/False)
4.8/5
(34)
Showing 21 - 30 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)