2024 C702 - FORENSICS AND
NETWORK INTRUSION EXAM WITH
CORRECT ANSWERS
What is a benefit of forensic readiness?
Establishes procedures for fast and efficient investigations
Reduces the need for interface with law enforcement
Eliminates the need to follow regulatory requirements
Ensures maximum regulatory fines for data disclosure - CORRECT-
ANSWERSEstablishes procedures for fast and efficient investigations
What should be considered when creating a forensic readiness plan?
Source of the evidence
Pertinence of the evidence
Problems that the evidence might cause in court
Which Windows event ID gets logged when a new process is started?
4660
4688
5156
7036 - CORRECT-ANSWERS4688
Which Tor network relay allows a client IP address to be read?
Entry relay
Middle relay
Exit relay
,Frame relay - CORRECT-ANSWERSEntry relay
Which Open Web Application Security Project (OWASP) Top 10 IoT
vulnerability refers to sensitive information in the ecosystem not being
encrypted?
Insecure data transfer and storage
Insufficient privacy protection
Lack of device management
Use of insecure or outdated components - CORRECT-ANSWERSInsecure data
transfer and storage
Company A is using Company B to host data. Company A lets Company B
perform all the daily activities of managing the data. Company A's customers
are unaware of the security procedures Company B uses to host the data.
Which threat does this depict?
What should a forensic investigator collect to analyze the email artifacts of a
Tor Browser session?
Memory dump
Storage device dump
Registry dump
User profile dump - CORRECT-ANSWERSMemory dump
A forensic investigator is investigating an attack on a WordPress database.
The investigator has already made a backup of the database from the MySQL
server and needs to restore the data on the forensic investigator's laptop.
Which command creates a database named wordpress?
Which tool should a forensic investigator use to collect the API call history for
Amazon Web Service (AWS) accounts?
CloudTrail
CloudWatch
ZyLAB eDiscovery
Lexbe eDiscovery - CORRECT-ANSWERSCloudTrail
Which command should a forensic investigator use to extract the device
activity from an Amazon Alexa while using the investigator's laptop?
adb pull
adb push
adb shell
adb logcat - CORRECT-ANSWERSadb pull
Where should a forensic investigator look for the Integrated Circuit Card ID
(ICCID) when collecting cellular evidence?
Mobile phone device
Mobile switching center
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Elitaa. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.