Given below are different steps involved in event correlation.
Event masking
Event aggregation
Root cause analysis
Event filtering
Identify the correct sequence of steps involved in event correlation.
An organization decided to strengthen the security of its network by studying and analyzing the behavior of attackers. For this purpose, Steven, a security analyst, was instructed to deploy a device to bait attackers. Steven selected a solution that appears to contain very useful information to lure attackers and find their locations and techniques.
Identify the type of device deployed by Steven in the above scenario.
Cooper, a forensic analyst, was examining a RAM dump extracted from a Linux system. In this process, he employed an automated tool, Volatility Framework, to identify any malicious code hidden inside the memory.
Which of the following plugins of the Volatility Framework helps Cooper detect hidden or injected files in the memory?
Below is the syntax of a command-line utility that displays active TCP connections and ports on which the computer is listening.
netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]
Identify the netstat parameter that displays active TCP connections and includes the process ID (PID) for each connection.
Below are the various steps involved in an email crime investigation.
1.Acquiring the email data
2.Analyzing email headers
3.Examining email messages
4.Recovering deleted email messages
5.Seizing the computer and email accounts
6.Retrieving email headers
What is the correct sequence of steps involved in the investigation of an email crime?
James, a forensic specialist, was appointed to investigate an incident in an organization. As part of the investigation, James is attempting to identify whether any external storage devices are connected to the internal systems. For this purpose, he employed a utility to capture the list of all devices connected to the local machine and removed suspicious devices.
Identify the tool employed by James in the above scenario.
Which of the following NTFS system files contains a record of every file present in the system?
While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:
C:> net view <\10.10.10.11>
What was Jessy’s objective in running the above command?
Which of the following file systems is developed by Apple to support Mac OS in its proprietary Macintosh system and replace the Macintosh File System (MFS)?
A disk drive has 16,384 cylinders, 80 heads, and 63 sectors per track, and each sector can store 512 bytes of data.
What is the total size of the disk?