× Close
Join the Ques10 Community
Ques10 is a community of thousands of students, teachers, and academic experts, just like you.
Join them; it only takes a minute
Sign up

User: nisha.vanjari

Reputation:
0
Status:
Trusted
Location:
india
Last seen:
1 month, 3 weeks ago
Joined:
6 months, 1 week ago
Email:
n************@gmail.com

Academic profile

None
None
None
None

Posts by nisha.vanjari

<prev • 70 results • page 1 of 7 • next >
0
votes
1
answer
162
views
1
answers
Answer: A: What is incident response process?
... Incident response is a coordinated and structured approach to go from incident detection to resolution. Incident response may include activities that: • Confirm whether or not an incident occurred • Provide rapid detection and containment • Determine and document the scope of the incident • Prev ...
written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160
0
votes
1
answer
162
views
1
answer
What is incident response process?
... **Subject:** Digital Forensics **Topic:** Introduction **Difficulty:** Medium ...
df(18) written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160
0
votes
1
answer
126
views
1
answers
Answer: A: In what situations would collect an image of memory most useful to the investiga
... **A memory image is useful in two situations.** First, when malware is primarily memory-resident and leaves little trace evidence on storage. Second, when attackers use encryption. We’ve gained access to many a password-protected RAR file through the examination of memory images. ...
written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160
0
votes
1
answer
126
views
1
answer
In what situations would collect an image of memory most useful to the investigation?
... Subject: Digital Forensics Topic: Initial response and forensic duplication **Difficulty:** Low ...
df(18) written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160
0
votes
1
answer
208
views
1
answers
Answer: A: Explain the pros and cons of performing a live response evidence collection vers
... A live response is typically used for two purposes, to gather volatile evidence before a system is shut down for imaging, and as a ‘first look’ at a system to determine whether it requires additional attention. In large enterprise investigations, you may find that most of your investigation is acc ...
written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160
0
votes
1
answer
188
views
1
answers
Answer: A: What investigative questions is a live data collection likely to help answer?
... Potentially, a live collection may answer the majority of questions you may have during the initial stages of an investigation. It depends on the level of detail that you collect during a live response. **A small collection consisting of** • users, • processes, • select registry keys, and ...
written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160
0
votes
1
answer
201
views
1
answers
Answer: A: Explain how to acquire disk image?
... The ' dd ' command is one of the original Unix utilities and should be in everyone's tool box. It can strip headers, extract parts of binary files and write into the middle of floppy disks; it is used by the Linux kernel Makefiles to make boot images. It can be used to copy and convert magnetic tape ...
written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160
0
votes
1
answer
190
views
1
answers
Answer: A: Explain the pros and cons of performing a live response evidence collection vers
... A live response is typically used for two purposes, to gather volatile evidence before a system is shut down for imaging, and as a ‘first look’ at a system to determine whether it requires additional attention. In large enterprise investigations, you may find that most of your investigation is acc ...
written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160
0
votes
1
answer
145
views
1
answers
Answer: A: What investigative questions is a live data collection likely to help answer?
... Potentially, a live collection may answer the majority of questions you may have during the initial stages of an investigation. It depends on the level of detail that you collect during a live response. A small collection consisting of • users, • processes, • select registry keys, and • ne ...
written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160
0
votes
1
answer
187
views
1
answers
Answer: A: If you have connected evidence hard drives to a system for imaging, do you need
... A write blocker is any tool that permits read-only access to data storage devices without compromising the integrity of the data. A write blocker, when used properly, can guarantee the protection of the data chain of custody. **NIST‘s general write blocking requirements hold that:** - The tool s ...
written 4 months ago by nisha.vanjari0 • updated 4 months ago by awari.swati831160

Latest awards to nisha.vanjari

No awards yet. Soon to come :-)


Use of this site constitutes acceptance of our User Agreement and Privacy Policy.