CORRECT SOLUTIONS
Anti-Forensics - ANSWER-A series of techniques designed to frustrate forensic
investigators and their digital forensic techniques.
What are some techniques to counter forensic techniques - ANSWER-Securely
overwriting data, overwriting metadata, code doesn't run in debugging mode, won't
run in VM, prevent system from entering safe or debugging mode. tamper with time
stamps, run code from usb drive, run in read only mode so system won't update file
info.
firewall best practice - ANSWER-- written firewall policy (procedures and checklist)
- routinely review and update
- Backup configuration
- most important rules at the top
- deny all at the bottom
- update patches, test
- routine audits
- no exception policy
- install A/V and A/M
- harden
- avoid remote access if possible
- filter Internet access
- physical security
What is the most important step to configure a home firewall/router - ANSWER-
change default username and password
What type of firewall is the first choice for SOHO? - ANSWER-OS host firewall
how do we determine type of firewall - ANSWER-commercial vs. off the shelf
budget, requirements, ability to build own & write patches, support needs,
performance, scalability, flexibility, security assurance, audit capabilities, ( p. 383)
reverse proxy - ANSWER-A computer or an application program that routes external,
incoming requests to the correct server on the internal network thereby hiding those
servers from the wild.
firewalls primary purpose - ANSWER-a network device that filters communications
traffic based on a set of pre-defined rules.
Host Firewalls - ANSWER-Software components of an operating system that limit
connections to a client or server