TU Wien:Digital Forensics VU (Weippl)/Midterm Exam 2017-11-13
Zur Navigation springen
Zur Suche springen
At least 1 answer is correct, up to 4 - for all 25 questions. The questions and answers were given in English and German as well.
Some questions of exam A:
- Which of these attributes are mandatory for all MFT entries?
- $DATA
- $STANDARD_INFORMATION
- $FILE_NAME
- ..
- Which job is a good prequisite to easily become a forensics expert?
- Dentist
- System administrator
- Teacher
- Network engineer
- What statements are true about UserAssist?
- Stores each program execution date
- Stores the last program execution date
- Stores the number of program executions
- Is saved in the registry
- What sizes are currently used in the NTFS file system?
- 4096 bytes sector size (used to be 512 bytes) and 4096 bytes cluster size
- 4096 bytes sector size and 4096 bytes cluster size (used to be 512 bytes)
- 512 bytes sector size and 512 bytes cluster size
- 512 bytes sector size and 4096 bytes cluster size
- Was besagt der Überwälzungsgrundsatz?
- bezahlt werden muss zuerst vom Auftraggeber
- der Auftraggeber kann das bezahlte Geld auch an den Verlierer eines Prozesses überwälzen
- What statements are correct concerning forensics in companies?
- There is es gibt einen fixen ablauf dem jeder folgen muss
- Guides by NIST have to be applied 1:1
- Guides by NIST can be applied mixed
- Guides have to be adjusted to fit the company
- What is the advantage of looking into data of previous incidents?
- Data can be restored like in a backup 1:1
- Previous incident data can help and recure work enormously when analyzing the current incident
- What statements are true concerning the Gutachten and Befund?
- Der Befund stellt alle relevanten Tatsachen, aus denen die spaeteren Schlussfolgerungen gezogen werden, dar
- Der Befund ist die Grundlage fuer das Gutachten im engeren Sinn. Alle Schluesse und Aeusserungen, die sich darin befinden, muessen auf im Befund dokumentierten Tatsachen fundieren
- What statements are true concerning evidence
- A judge has to acknowledge all evidences
- Evicence consisting of reports by laypersons has to be acknowledged
- Evicence consisting of reports has to be acknowledged
- What are the disadvantages of using DMA?
- DMA changes the RAM state
- One has to carry a DMA tool with him
- DMA depends on the OS
- DMA influences paging
- What are the advantages of using DMA?
- see previous question, all answers were just the same or inverted...
- What about documentation?
- is the most important thing
- is a hard thing that is easy to be done wrong
- saves a forensics guy from being accused to have manipulated the data
- Software vs hardware RAM aquisition?
- Software is cheaper
- Software is OS-independent
- What statements are true concerning Vtypes in Volatility?
- Maps C types to Python
- Supports as many data types as C provides
- Are used to model a specific OS/hardware architecture
- Is needed to execute the main Python script (vol.py)
- You see a locked PC that has no port to use DMA (Firewire, etc.). What do you do?
- Use a cold boot attack
- Turn the PC off and analyze the HDD in the lab
- Use FTK3
- Use Volatility
- Which cryptographical functions are used to achieve integrity?
- AES with ECB
- AES with CBC
- Cryptographical hash functions
- Fuzzy hashing
- Which techniques did Max Butler (from the book Kingpin) in the example use? He...
- hacked into WiFis
- did stack based buffer overflows
- captured RAM
- used Tor for hacking
- Concerning HDD analysis, which statements are true?
- Using hardware write blockers is mandatory
- Using hardware write blockers is optional
- Using software write blockers is sufficient
- There exists a hardware write blocker which can handle RAID
- Which of those file attributes exist?
- Modified
- Updated
- Created
- Moved
- When a file is deleted on hard disk, what does change?
- The file is overwritten multiple times
- The MFT entry is marked as deleted
- The bitmap of the corresponding sectors is set to 1
- The bitmap of the corresponding sectors is set to 0
- Welche dieser Punkte sind in einem Gutachten unzulässig?
- Rechtsbelehrungen anzubieten
- Unüberprüfbare Behauptungen
- Which statements are true about aquisition?
- Acquisition is not repeatable
- May provoke paging
- Is invasive (RAM regions get overwritten)
- ?
- ?
- ?
Some questions of exam B:
- Which commands do you use to analyse processes, when doing an forensic analysis?
- psscan
- pstree
- pslist
- ?