WITH COMPLETE ANSWERS { GRADED
A+}
A thorough OSINT investigation will:
focus on the surrounding aspects of a target, such as employment and family, but
leave the target's specific data insight to be revealed during the analysis of a hard
drive.
rely solely on tools, as they ensure every site on the web is reviewed for your key
data points.
,involve multiple sites, connecting the dots of the data found, to build the most
complete understanding of the target.
review only social media posts by the target. - ✔✔involve multiple sites,
connecting the dots of the data found, to build the most complete understanding of
the target.
Which of the following explains subverting or misusing computers as a
communications medium?
metadata on a phone indicating where a picture of missing minor was taken
hackers gaining access to systems they do not own
blocking all incoming connection on port 80
finding a community of people with similar interests in fake drug sales -
✔✔finding a community of people with similar interests in fake drug sales
,What is an operating system?
Systematic searching and investigation process of a device that an investigation
must legally operate within.
Programs that allow users to browse the Internet.
Storage aspects of a hard drive.
Provides the basic functions of a computer that allows programs to be run on the
underlying hardware. - ✔✔Provides the basic functions of a computer that allows
programs to be run on the underlying hardware.
When performing forensics in a business environment, the timestamp information
is always configured in the local and relevant settings for the machine that it
occurred on.
True
False - ✔✔False
, A business fraud investigation that involves a network presents interesting
challenges if it is deemed necessary to physically image the server or a storage
device, instead of the more typical data recovery analysis. This is because (select
all that apply)
Business never keep their servers on site.
Business cannot be interrupted while the server is offline being imaged..
Cloud storage means storage is not always on-site.
Storage devices cannot be quickly imaged. - ✔✔Business cannot be interrupted
while the server is offline being imaged.
Cloud storage means storage is not always on-site.
Which of the following explains subverting or misusing computers as a targeted
device?