× Close
Join the Ques10 Community
Ques10 is a community of thousands of students, teachers, and academic experts, just like you.
Join them; it only takes a minute
Sign up

User: nisha.vanjari

Reputation:
0
Status:
Trusted
Location:
india
Last seen:
2 months, 1 week ago
Joined:
3 months, 1 week ago
Email:
n************@gmail.com

Academic profile

None
None
None
None

Posts by nisha.vanjari

<prev • 70 results • page 1 of 7 • next >
0
votes
1
answer
70
views
1
answers
Answer: A: What is incident response process?
... Incident response is a coordinated and structured approach to go from incident detection to resolution. Incident response may include activities that: • Confirm whether or not an incident occurred • Provide rapid detection and containment • Determine and document the scope of the incident • Prev ...
written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190
0
votes
1
answer
70
views
1
answer
What is incident response process?
... **Subject:** Digital Forensics **Topic:** Introduction **Difficulty:** Medium ...
df(18) written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190
0
votes
1
answer
62
views
1
answers
Answer: A: In what situations would collect an image of memory most useful to the investiga
... **A memory image is useful in two situations.** First, when malware is primarily memory-resident and leaves little trace evidence on storage. Second, when attackers use encryption. We’ve gained access to many a password-protected RAR file through the examination of memory images. ...
written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190
0
votes
1
answer
62
views
1
answer
In what situations would collect an image of memory most useful to the investigation?
... Subject: Digital Forensics Topic: Initial response and forensic duplication **Difficulty:** Low ...
df(18) written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190
0
votes
1
answer
118
views
1
answers
Answer: A: Explain the pros and cons of performing a live response evidence collection vers
... A live response is typically used for two purposes, to gather volatile evidence before a system is shut down for imaging, and as a ‘first look’ at a system to determine whether it requires additional attention. In large enterprise investigations, you may find that most of your investigation is acc ...
written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190
0
votes
1
answer
115
views
1
answers
Answer: A: What investigative questions is a live data collection likely to help answer?
... Potentially, a live collection may answer the majority of questions you may have during the initial stages of an investigation. It depends on the level of detail that you collect during a live response. **A small collection consisting of** • users, • processes, • select registry keys, and ...
written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190
0
votes
1
answer
110
views
1
answers
Answer: A: Explain how to acquire disk image?
... The ' dd ' command is one of the original Unix utilities and should be in everyone's tool box. It can strip headers, extract parts of binary files and write into the middle of floppy disks; it is used by the Linux kernel Makefiles to make boot images. It can be used to copy and convert magnetic tape ...
written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190
0
votes
1
answer
108
views
1
answers
Answer: A: Explain the pros and cons of performing a live response evidence collection vers
... A live response is typically used for two purposes, to gather volatile evidence before a system is shut down for imaging, and as a ‘first look’ at a system to determine whether it requires additional attention. In large enterprise investigations, you may find that most of your investigation is acc ...
written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190
0
votes
1
answer
86
views
1
answers
Answer: A: What investigative questions is a live data collection likely to help answer?
... Potentially, a live collection may answer the majority of questions you may have during the initial stages of an investigation. It depends on the level of detail that you collect during a live response. A small collection consisting of • users, • processes, • select registry keys, and • ne ...
written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190
0
votes
1
answer
101
views
1
answers
Answer: A: If you have connected evidence hard drives to a system for imaging, do you need
... A write blocker is any tool that permits read-only access to data storage devices without compromising the integrity of the data. A write blocker, when used properly, can guarantee the protection of the data chain of custody. **NIST‘s general write blocking requirements hold that:** - The tool s ...
written 7 weeks ago by nisha.vanjari0 • updated 7 weeks ago by awari.swati83190

Latest awards to nisha.vanjari

No awards yet. Soon to come :-)


Use of this site constitutes acceptance of our User Agreement and Privacy Policy.