CHFI Exam 312-49 Computer Forensics

The CHFI Exam 312-49 prep from a study guide from syngress. 

19 cards   |   Total Attempts: 190
  

Related Topics

Cards In This Set

Front Back
What is Computer Forensics?
The preservation, identifications, extraction, interpretation, and documentation of computer evidence.
What is Digital Forensics?
The scientific acquisition, analysis, and preservation of data contained in electronic media and info can be used as evidence in a court of law.
What are the three main functions of the TRIAD?
Vulnerability assessment and risk management, network intrusion detection, and incident response computer investigations.
What two tests for evidence for both computer forensics and physical forensics have to survive in a court of law?
Authenticity - Where does the evidence fomr from? Reliability - Is the evidence reliable and free from flaws?
What are the five main cyber crimes?
Theft of Intellectual Property, Damage of company service networks, $ fraud, Hacker penetrations, Distribution and execution of viruses and worms
What is theft of intellectual property?
And act that allows access to patent, trade secrets, customer data, sales trends, and any confidential information.
What are four examples of damage of company service networks?
Planting a trojan horse, conduct denial of service attack, install unauthorized modem or back door to allow unauthorized access to network or systems.
What is financial fraud?
Using fraudulent solicitation to prospective victims to conduct fraudulent transactions.
What are hacker system penetrations?
These occur via the use of sniffers, rootkits, and other tools that take advantage of vulnerabilities of systems or software.
What is the most common form of cyber crime?
The distribution and execution of viruses and worms.
What constitutes a computer crime?
An intentional illegal act involving a computer, its system, or applications.
What is the first of the five stages of forensic investigation involving tracking computer crimes?
Identify the crime to include the computer and other tools to commit the crime.
What is the second of the five stages of forensic investigation involving tracking computer crimes?
Gathers evidence to build a suitable chain of custody,
What is the third of the five stages of forensic investigation involving tracking computer crimes?
Recovers data, must image, duplicate and replicate it.
What is the fourth of the five stages of forensic investigation involving tracking computer crimes?
Analyze the duplicated evidence