CIS 4385 Exam 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/436

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

437 Terms

1
New cards

What is opacity in windows?

sometimes we have to guess what Microsoft's system designers were thinking

2
New cards

What is fracturing in windows?

Every windows flavor has different quirks

3
New cards

T/F: WFA usefully categorizes state by its volatility

True

4
New cards

T/F: Information stored in RAM is most volatile

True

5
New cards

T/F: *PROM is probably the least volatile

True

6
New cards

What is a popular approach for live forensics?

running programs from some sort of removable media

7
New cards

How do you make a USB stick non-modifiable?

explicit hardware switch or by using a "write-blocker"

8
New cards

What is Perl like?

Easy to write, but less easy to read than Python.

9
New cards

Handles system-level information gracefully for a large amount of systems and their structures

10
New cards

What does signalfd(2) do?

It is a kernel-level mechanism that will give Perl the ability to interact with recondite bits of the operating systems

11
New cards

How would you get the same results for a date and time in a windows machine, as a linux machine?

date /t & time /t

12
New cards

T/F: It is a good idea to copy memory early on

True

13
New cards

What are some possibilities for system identification?

hostname, whoami, and ver

14
New cards

more currently, psinfo and systeminfo

15
New cards

What are some ways to look for logins?

psloggedon and logonsessions

16
New cards

quser

17
New cards

T/F: if backdoors have been set up, then those logins will not show up using regular tools

True

18
New cards

What can you use to see what files are open?

net file

19
New cards

openfiles

20
New cards

Does windows natively support scheduling? if so, what is it?

Yes, schtasks

21
New cards

How do hackers use NetBIOS?

They can see configuration inforamtion about remote machines using nbtstat -c and nbtstat -A ADDRESS for addresses listed by the -c option

22
New cards

What is one of the most useful tools?

netstat -ano, which lets you see which PID created a connection

23
New cards

T/F: It is a good idea to make a copy of the ARP table

True

24
New cards

What will help you avoid the problems of using internal structures that might be manipulated or obscured by malware by instead taking an outside view?

nmap

25
New cards

What can you use to get the given "system prompt" keyboard history?

doskey /history, but it isn't likely to occur in practice

26
New cards

T/F: Another volatile information source are Windows shares

True

27
New cards

How do you achieve non-volatile information in windows?

Looking in the registry: autoruns[c]

28
New cards

Security configuration: winupdateslist from nirsoft

29
New cards

Static network configuration: hosts, networks, and lmhosts

30
New cards

Events: eldump

31
New cards

T/F: PowerShell is going to make a difference in the future for Digital Forensics

True

32
New cards

What does thunderbolt make a machine vulnerable to?

Rampant memory scanning

33
New cards

What is virtualization?

Gets a snapshot of a virtual machine

34
New cards

Why look into memory?

Metadata that malware or other malefactors might have associated with a process

35
New cards

Executable code

36
New cards

Real data

37
New cards

Basically, trying to learn what a malefactor had done and how it was done

38
New cards

What is the Exchange Principle?

if you start a process on the machine, you are changing the state of the machine

39
New cards

What does ptfinder.p1 do?

Walks through memory trying to enumerate processes and threads from memory dumps

40
New cards

What can be used to perform "fuzzy matching"?

ssdeep

41
New cards

What is the tool, volatility, used for?

attempts to analyze memory, but also sometimes able to find old data from processes that have already been terminated

42
New cards

What are hibernation files?

Hibernation files hold enough state to accurately reload memory

43
New cards

To search the heapstack, what tools should you use?

pslist: to find pids

44
New cards

userdump -p: can list processes with their pids

45
New cards

pmdump -list: another choice

46
New cards

T/F: userdump only works on older Microsoft operating systems and need to use other tools to acquire useful information

True

47
New cards

What is pmdump useful for?

Lets you easily create text dumps suitable for string searching

48
New cards

What does pd -p do?

It allows you to list processes and can be used with Memory Parser

49
New cards

What is TSK?

A Linux memory analysis tool that has been historically useful

50
New cards

What is the Linux equivalent of a shortcut?

Symbolic Link or Soft Link

51
New cards

What file system does Windows 7 use?

NTFS

52
New cards

What file system does OS X use?

HFS+

53
New cards

Why can you undelete files in Windows 7?

Nothing is deleted; it is just removed from MFT

54
New cards

What is the file format .edb used with?

Microsoft Exchange

55
New cards

T/F: IMAP uses port 143

True

56
New cards

Which of the following types of mass e-mails are covered by the CAN-SPAM Act?

Emails advertising: products, legal services, and stock prices

57
New cards

What is the .ost file format used for?

Microsoft Outlook offline storage

58
New cards

Lotus Notes uses the _ file format.

.nsf

59
New cards

__ was the first Windows operating system to support FAT32

Windows 95

60
New cards

How many hives are in the windows Registry?

5

61
New cards

T/F: Stack memory is stored in a first-in last-out format.

False

62
New cards

What is a concern for capturing live data that is caused by data being changed as it is being captured?

Slurred image

63
New cards

In Windows 7, the swap file ends with what extension?

.sys

64
New cards

What is the most common Linux file system?

ext

65
New cards

What is an inode?

a data structure in the file system that stores all the information about a file except its name and its actual data

66
New cards

What are two techniques common for recovering data after logical damage?

Consistency checking and zero-knowledge analysis

67
New cards

T/F: All email uses the same format, regardless of the operating system they run on.

True

68
New cards

What is one of the most fundamental tasks a forensic examiner will conduct?

Retrieving deleted data

69
New cards
70
New cards

Because even criminals know to delete data, and evidence is frequently deleted from examined computers

71
New cards

How do Hard Drives store and view data?

As sectors

72
New cards

What is a sector?

An area of one of the disk platters defined by 2 radii

73
New cards
74
New cards

512 bytes

75
New cards
76
New cards

They are contiguous

77
New cards

What is a cluster?

How file systems look at data

78
New cards
79
New cards

1-128 sectors

80
New cards
81
New cards

Need not consist of contiguous sectors

82
New cards
83
New cards

File systems view cluster as entirely utilized if even 1 bit is used

84
New cards

What tools are used for recovering deleted files on Windows?

-DiskDigger

85
New cards

-WinUndelete

86
New cards

-FreeUndelete

87
New cards

-OSForensics

88
New cards

What is FAT?

File Allocation Table

89
New cards
90
New cards

Named after table used to store cluster/file info

91
New cards
92
New cards

Each entry records 1 of 5 things:

93
New cards

1.If cluster # of next cluster is recorded

94
New cards

2.If this cluster is end of the chain

95
New cards

3.Bad clusters w/ special entry in table

96
New cards
  1. Reserved clusters w/ special entry in table
97
New cards

5.Open/available clusters also marked

98
New cards

How is data recovered on FAT?

Data not actually removed when deleted

99
New cards

Updated to reflect clusters no longer in use

100
New cards

If new info is saved, saved to clusters & data overwritten