User: nisha.vanjari

Reputation:
0
Status:
Trusted
Location:
india
Last seen:
7 months, 3 weeks ago
Joined:
1 year ago
Email:
n************@gmail.com

Academic profile

None
None
None
None

Posts by nisha.vanjari

<prev • 70 results • page 1 of 7 • next >
0
votes
1
answer
253
views
1
answers
Answer: A: What is incident response process?
... Incident response is a coordinated and structured approach to go from incident detection to resolution. Incident response may include activities that: • Confirm whether or not an incident occurred • Provide rapid detection and containment • Determine and document the scope of the incident • Prev ...
written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150
0
votes
1
answer
253
views
1
answer
What is incident response process?
... **Subject:** Digital Forensics **Topic:** Introduction **Difficulty:** Medium ...
df(18) written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150
0
votes
1
answer
212
views
1
answers
Answer: A: In what situations would collect an image of memory most useful to the investiga
... **A memory image is useful in two situations.** First, when malware is primarily memory-resident and leaves little trace evidence on storage. Second, when attackers use encryption. We’ve gained access to many a password-protected RAR file through the examination of memory images. ...
written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150
0
votes
1
answer
212
views
1
answer
In what situations would collect an image of memory most useful to the investigation?
... Subject: Digital Forensics Topic: Initial response and forensic duplication **Difficulty:** Low ...
df(18) written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150
0
votes
1
answer
460
views
1
answers
Answer: A: Explain the pros and cons of performing a live response evidence collection vers
... A live response is typically used for two purposes, to gather volatile evidence before a system is shut down for imaging, and as a ‘first look’ at a system to determine whether it requires additional attention. In large enterprise investigations, you may find that most of your investigation is acc ...
written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150
0
votes
1
answer
255
views
1
answers
Answer: A: What investigative questions is a live data collection likely to help answer?
... Potentially, a live collection may answer the majority of questions you may have during the initial stages of an investigation. It depends on the level of detail that you collect during a live response. **A small collection consisting of** • users, • processes, • select registry keys, and ...
written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150
0
votes
1
answer
312
views
1
answers
Answer: A: Explain how to acquire disk image?
... The ' dd ' command is one of the original Unix utilities and should be in everyone's tool box. It can strip headers, extract parts of binary files and write into the middle of floppy disks; it is used by the Linux kernel Makefiles to make boot images. It can be used to copy and convert magnetic tape ...
written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150
0
votes
1
answer
284
views
1
answers
Answer: A: Explain the pros and cons of performing a live response evidence collection vers
... A live response is typically used for two purposes, to gather volatile evidence before a system is shut down for imaging, and as a ‘first look’ at a system to determine whether it requires additional attention. In large enterprise investigations, you may find that most of your investigation is acc ...
written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150
0
votes
1
answer
226
views
1
answers
Answer: A: What investigative questions is a live data collection likely to help answer?
... Potentially, a live collection may answer the majority of questions you may have during the initial stages of an investigation. It depends on the level of detail that you collect during a live response. A small collection consisting of • users, • processes, • select registry keys, and • ne ...
written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150
0
votes
1
answer
292
views
1
answers
Answer: A: If you have connected evidence hard drives to a system for imaging, do you need
... A write blocker is any tool that permits read-only access to data storage devices without compromising the integrity of the data. A write blocker, when used properly, can guarantee the protection of the data chain of custody. **NIST‘s general write blocking requirements hold that:** - The tool s ...
written 10 months ago by nisha.vanjari0 • updated 10 months ago by awari.swati831150

Latest awards to nisha.vanjari

No awards yet. Soon to come :-)