Computer Science  >  EXAMs  >  WGU, Information Security and Assurance (C725), SET X (All)

WGU, Information Security and Assurance (C725), SET X

Document Content and Description Below

A branch of computer forensic analysis, involves the identification and extraction of information from storage media.This may include the following:Magnetic media (e.g., hard disks, tapes)Optical medi ... a (e.g., compact discs (CDs), digital versatile discs (DVDs), Blu-ray discs)Memory (e.g., random-access memory (RAM), solid-state storage)Techniques used for this type of analysis may include the recovery of deleted files from unallocated sectors of the physical disk, the live analysis of storage media connected to a computer system (especially useful when examining encrypted media), and the static analysis of forensic images of storage media. Correct Answer: Media Analysis A type of analysis in which the task of the analyst is to collect and correlate information from multiple disparate sources and produce as comprehensive a picture of network activity as possible.Methods include:- Intrusion detection and prevention system logs- Network flow data captured by a flow monitoringsystem- Packet captures deliberately collected during an incident- Logs from firewalls and other network security devices Correct Answer: Network Analysis A type of analysis in which an analyst may conduct a review of software code, looking for back doors, logic bombs, interpret the log files from application or database servers, seeking other signs of malicious activity, such as SQL injection attacks, privilege escalations, or other application attacks. Correct Answer: Software Analysis A type of Analysis in which an analyst may review the contents of hardware and embedded devices.This may include a review of:Personal computersSmartphonesTablet computersEmbedded computers in cars, security systems, and other devicesAnalysts conducting these reviews must have specialized knowledge of the systems under review. This often requires calling in expert consultants who are familiar with the memory, storage systems, and operating systems of such devices. Because of the complex interactions between software, hardware, and storage, the discipline of hardware analysis requires skills in both media analysis and software analysis.Investigation Process Correct Answer: Hardware/Embedded Device Analysis True or False Gathering Evidence allows three common alternatives:Voluntary surrender, subpoena, search warrant Correct Answer: True - Military and intelligence attacks - Business attacks - Financial attacks - Terrorist attacks - Grudge attacks - Thrill attacks Correct Answer: Types of Computer crimes A category of computer crime attacks in which are launched primarily to obtain secret and restricted information from law enforcement or military and technological research sources. Correct Answer: Military and intelligence attacks [Show More]

Last updated: 3 years ago

Preview 1 out of 7 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of WGU, Information Security and Assurance (C725), SET X document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$8.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

64
0

Document information


Connected school, study & course


About the document


Uploaded On

Nov 12, 2022

Number of pages

7

Written in

All

Seller


Profile illustration for Crum
Crum

Member since 3 years

64 Documents Sold

Reviews Received
10
1
1
0
1
Additional information

This document has been written for:

Uploaded

Nov 12, 2022

Downloads

 0

Views

 64

Document Keyword Tags

Recommended For You

Get more on EXAMs »

$8.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·