Penetration testing Week 3
.docx
keyboard_arrow_up
School
Grand Rapids Community College *
*We aren’t endorsed by this school
Course
CYBER SECU
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
4
Uploaded by ConstableWildcatMaster401
Congratulations! You passed!
Grade received 100%
Latest Submission Grade 100%
To pass 80% or higher
Go to next item
1.
Question 1
Digital forensics is commonly applied to which of the following activities?
1 / 1 point
Criminal investigation
Incident handling
Data recovery
All of the above
Correct
Correct!
2.
Question 2
NIST includes which three (3) as steps in collecting data? (Select 3)
1 / 1 point
Acquire the data
Correct
Partially correct!
Normalize the data
Develop a plan to aquire the data
Correct
Partially correct!
Verify the integrity of the data
Correct
Partially correct!
3.
Question 3
What is the primary purpose of maintaining a chain of custody?
1 / 1 point
So a person in possession of evidence will know who they are allowed to give it to next
To avoid allegations of mishandling or tampering of evidence.
To keep valuable hardware securely locked to tables or floors.
To allow for accurate client billing
Correct
Correct!
4.
Question 4
True or False. Digital forensics had been used to solve a number of high-profile violent crimes.
1 / 1 point
True
False
Correct
Correct!
5.
Question 5
True or False. Digital forensics report is a summary of your findings. If your case goes to trial, your testimony can, and usually does, involve far more detail than is in the report.
1 / 1 point
True
False
Correct
Correct!
6.
Question 6
Which section of a digital forensics report would include using the best practices of taking lots of screenshots, use built-in logging options of your digital forensics tools, and exporting key data items into a .csv or .txt file?
1 / 1 point
Overview & Case Summary
Forensic Acquisition & Examination Preparation
Findings & Analysis
Conclusion
Correct
Correct!
7.
Question 7
Which types of files are appropriate subjects for forensic analysis?
1 / 1 point
Data files
Image and video files
Application files
All of the above
Correct
Correct!
8.
Question 8
Deleting a file results in what action by most operating systems?
1 / 1 point
The memory registers used by the file are marked as available for new storage but are otherwise not
changed.
Random data is immediately copied into the memory registers used by the file to obfuscate the previous contents.
The memory registers used by the file are erased and marked as available for new storage.
The file is copied to a trash or recycle folder and the original memory registers are erased.
Correct
Correct!
9.
Question 9
Forensic analysis should always be conducted on a copy of the original data. What type of copying is appropriate for getting data from a live system that cannot be taken offline?
1 / 1 point
A logical backup
A disk-to-file backup
An incremental backup
A disk-to-disk backup
Correct
Correct!
10.
Question 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help