Penetration testing Week 3

.docx

School

Grand Rapids Community College *

*We aren’t endorsed by this school

Course

CYBER SECU

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by ConstableWildcatMaster401

Congratulations! You passed! Grade received 100% Latest Submission Grade 100% To pass 80% or higher Go to next item 1. Question 1 Digital forensics is commonly applied to which of the following activities? 1 / 1 point Criminal investigation Incident handling Data recovery All of the above Correct Correct! 2. Question 2 NIST includes which three (3) as steps in collecting data? (Select 3) 1 / 1 point Acquire the data Correct Partially correct! Normalize the data Develop a plan to aquire the data Correct Partially correct! Verify the integrity of the data Correct Partially correct! 3. Question 3 What is the primary purpose of maintaining a chain of custody? 1 / 1 point So a person in possession of evidence will know who they are allowed to give it to next To avoid allegations of mishandling or tampering of evidence. To keep valuable hardware securely locked to tables or floors. To allow for accurate client billing Correct Correct! 4. Question 4 True or False. Digital forensics had been used to solve a number of high-profile violent crimes. 1 / 1 point True False Correct Correct! 5. Question 5 True or False. Digital forensics report is a summary of your findings. If your case goes to trial, your testimony can, and usually does, involve far more detail than is in the report.
1 / 1 point True False Correct Correct! 6. Question 6 Which section of a digital forensics report would include using the best practices of taking lots of screenshots, use built-in logging options of your digital forensics tools, and exporting key data items into a .csv or .txt file? 1 / 1 point Overview & Case Summary Forensic Acquisition & Examination Preparation Findings & Analysis Conclusion Correct Correct! 7. Question 7 Which types of files are appropriate subjects for forensic analysis? 1 / 1 point Data files Image and video files Application files All of the above Correct Correct! 8. Question 8 Deleting a file results in what action by most operating systems? 1 / 1 point The memory registers used by the file are marked as available for new storage but are otherwise not changed. Random data is immediately copied into the memory registers used by the file to obfuscate the previous contents. The memory registers used by the file are erased and marked as available for new storage. The file is copied to a trash or recycle folder and the original memory registers are erased. Correct Correct! 9. Question 9 Forensic analysis should always be conducted on a copy of the original data. What type of copying is appropriate for getting data from a live system that cannot be taken offline? 1 / 1 point A logical backup A disk-to-file backup An incremental backup A disk-to-disk backup Correct Correct! 10. Question 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help