Digital Forensics Final

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

flashcard set

Earn XP

Description and Tags

Chapter 13 (Network Forensics), Chapter 8 (Windows Forensics), Chapter 09 (Linux Forensics), and Chapter 12 (Mobile Forensics)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Which statement best explains why journaling file systems (e.g., Ext3/Ext4) are helpful in forensic investigations?

They record pending changes.

2
New cards

In the Linux boot process, which component is responsible for loading the selected kernel into memory?

GRUB

3
New cards

Why is the /etc directory often targeted during an intrusion?

It holds system configuration files.

4
New cards

What is a primary forensic value of the /proc directory?

It contains kernel and process information directly from memory.

5
New cards

A suspicious USB device was plugged into a Linux system. Which command is most useful to identify when it was connected?

dmesg

6
New cards

Which directory contains critical files needed for booting the Linux operating system?

/boot

7
New cards

What does the file command help a forensic investigator determine?

The type of content stored inside the file

8
New cards

Why must /tmp often be examined while the system is still running?

Its contents may be wiped on reboot.

9
New cards

A file appears in /dev. What does this typically indicate?

It is a hardware interface object.

10
New cards

Which command can help map parent–child relationships between running processes?

pstree

11
New cards

Why is /var/log a high-value forensic location?

It maintains system and application logs.

12
New cards

The dd command is most commonly used for which forensic purpose?

Cloning drives bit-by-bit

13
New cards

What does the mount command help an investigator determine?

Which file systems are currently attached

14
New cards

What is the main difference between /tmp and /var/tmp?

/var/tmp persists across reboots; /tmp may be cleared on reboot

15
New cards

When the UE is in idle state, what is it still required to do?

Listen for paging messages

16
New cards

Which forensic evidence helps reconstruct a user’s movement timeline?

UE radio logs showing TAC changes and TAU events

17
New cards

Why does a BS resource-depletion attack block legitimate users?

The attacker consumes all available RRC connection slots.

18
New cards

In a remote deregistration attack, what inconsistency appears in logs?

De-register messages in network logs that do NOT exist in the UE’s logs.

19
New cards

In an authentication bypass attack, which abnormal behavior is observed?

RRC reconfiguration occurs without any completed security procedure.

20
New cards

iOS uses APFS because it allows what feature?

Per-file and multi-key encryption

21
New cards

When investigating a suspected ARP poisoning attack on a LAN, which header/field should you inspect first?

Sender MAC address

22
New cards

To detect overlapping or malformed IP fragments used in teardrop attacks, which header field should you examine?

Fragment Offset, More Fragments (MF) flag, and Total Length

23
New cards

Which header field should an investigator check to determine if injected TCP segments were accepted by a victim?

Sequence and Acknowledgment numbers

24
New cards

Which layer(s) typically contain encrypted data and are not visible to an investigator without decryption keys?

Application and Session layer

25
New cards

Which layer of the OSI model is responsible for data encryption and compression?

Presentation layer

26
New cards

An ARP poisoning attack occurs at which OSI layer?

Data Link

27
New cards

The Ping of Death attack involves

Sending oversized packets

28
New cards

The Teardrop attack exploits

Fragment offsets

29
New cards

The Smurf attack primarily uses which protocol?

ICMP

30
New cards

The Fraggle attack differs from the Smurf attack because it uses

UDP

31
New cards

A MAC address spoofing attack allows an attacker to

Impersonate another device on a LAN

32
New cards

Which attack exhausts DHCP server IP address pools?

DHCP starvation

33
New cards

Log files generally provide

Metadata

34
New cards

Which header should you examine first to detect an HTTP POST attack?

Content-Length header

35
New cards

Which Windows file acts as an extension of physical memory (RAM) and is commonly analyzed for evidence of program execution or credentials?

pagefile.sys

36
New cards

Which Windows registry hive contains information about local user accounts and password hashes?

SAM

37
New cards

The Prefetch files in Windows primarily reveal:

Which programs ran, when, and how often

38
New cards

Which Windows artifact tracks files and folders recently opened by specific applications, helping reconstruct user activity?

Jumplists

39
New cards

Which forensic artifact can confirm that a specific USB drive was connected to a Windows system, along with its serial number?

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR

Explore top flashcards