Question

In: Computer Science

**PLEASE ANSWER ALL QUESTIONS** Calliope is a forensics detective with a law enforcement agency. She discovers...

**PLEASE ANSWER ALL QUESTIONS**

Calliope is a forensics detective with a law enforcement agency. She discovers that an attacker who has just been caught was using a dead-drop method of controlling the bots in a botnet. Which of the following might have been a clue that the attacker was using this method?

a.

Finding devices that the attacker had hidden on multiple victims’ company networks

b.

Finding a directional antenna and Wi-Fi setup that allowed the bot herder to beam communications directly to the target computers

c.

Finding an e-mail account with multiple saved drafts that were never sent but contained instructions the bots were to follow

d.

Reading log files that contained constant encrypted communications from the attacker’s IP address to some of the identified bots

Belvais performing an audit of the e-mail server when she discovers that one of the accounts is sending a lot of e-mails all day that contain attachments. After a bit more research, she finds that the attachments contain extensive proprietary and confidential information. Which of the following should she consider implementing to prevent a reoccurrence?

a.

Buffer filtering

b.

DLP

c.

PoS

d.

Access point probe

Alika has just finished eradicating a piece of malware from a computer system. Which of the following might she do next as part of the validation process?

a.

Secure erase

b.

Patching

c.

Reconstruction

d.

Reimaging

Jaden has received an alert from a system that has identified potential malware on itself. Upon looking through the log files, he sees a list of error messages where an executable tried to write data to a range of memory addresses that did not exist for the system. Which of the following has most likely occurred?

a.

Space overflow

b.

Decimal overflow

c.

Buffer overflow

d.

Integer overflow

Victoria, a cybersecurity analyst, has just disconnected a computer from the network after finding that it was infected with malware. Which of the following is the next task that she should attempt to perform with the system?

a.

Containment

b.

Patching

c.

Eradication

d.

Validation

Solutions

Expert Solution

a.Finding devices that the attacker had hidden on multiple victims’ company network

  • The dead-drop method is related to indirect communication.
  • Instruction will be at another place.
  • The bot will take that instruction from there.
  • Here the attacker is directly communicating with the bot.
  • So the answer is finding devices that the attacker had hidden on multiple victims’ company networks.

b.DLP

  • It stands for Data Loss Prevention.
  • It detects data breaches.
  • Also, monitor the transmission and then detect and block the sensitive data during the transmission.

b.Patching

  • She must do patching.
  • Because it will help to reduce system crashes and security breaches.

c.Buffer overflow

  • Web application’s execution stack is corrupted using the buffer overflow by the attacker.
  • They are very harder to exploit.

c.Eradication

  • If malware is affected in a system, we should take care of spreading it to other systems. She already did it.
  • After that, she should eradicate in the next step.
  • So that the answer is eradication.




Related Solutions

As a digital forensics examiner, you often accompany law enforcement teams to execute a search warrant....
As a digital forensics examiner, you often accompany law enforcement teams to execute a search warrant. Consider a situation where a law enforcement team is planning to execute a search warrant in a large and powerful organization. You are advised to join the team as a chief digital forensics examiner. You are given a full briefing about the search warrant execution and it is expected that the location will have a lot of digital equipment as well as large amount...
In preparation for a court appearance, the federal law enforcement agency wants to ensure proper forensic...
In preparation for a court appearance, the federal law enforcement agency wants to ensure proper forensic processes and techniques are used in a computer crime case involving identify theft. When challenging the admissibility of the digital evidence, the defense examiner will evaluate the authentication and chain of custody techniques used. The federal law enforcement agency would like your company, AB Investigative Services (ABIS), to identify in a report the possible authentication and chain of custody techniques acceptable in the investigative...
in 350 Words, What has an orginzation or a public agency( ie law enforcement) done or...
in 350 Words, What has an orginzation or a public agency( ie law enforcement) done or what can they do to increase organizational ethical performance?
PLEASE ANSWER ALL QUESTIONS ! 1. Gwen suspects fraud is occurring at a hotel she manages....
PLEASE ANSWER ALL QUESTIONS ! 1. Gwen suspects fraud is occurring at a hotel she manages. Historically, each of her hotels spends $8,250 per month in maintenance expenses with a standard deviation of $1,070. At the suspect hotel, the last 31 months have averaged $8,490 in maintenance expenses. Gwen thinks the hotel is spending significantly more than the others. Use the 10% significance level. Calculate the value of the test statistic. Select one: a. 0.87 b. 0.89 c. 1.36 d....
Overtime budgeting in a law enforcement agency that can be addressed through research. Take your identified...
Overtime budgeting in a law enforcement agency that can be addressed through research. Take your identified problem through each of the eight steps of the research design process. Explain how the concepts of validity and reliability presented in your research. What type of data set discussed determined your research design?
Use Excel to answer the following question: Sundance Detective Agency purchased new surveillance equipment with the...
Use Excel to answer the following question: Sundance Detective Agency purchased new surveillance equipment with the following estimates. Note: The year index is k = 1, 2, 3, ... to calculate the maintenance costs and extra revenues for the corresponding years. First cost ($) 1,050 Annual maintenance cost ($ in year k) 70 + 5k Extra revenue ($ in year k) 200 + 50k Salvage value ($ at the end of the useful life) 600 (a) Prepare a cash-flow (CF)...
Suppose that our company performs DNA analysis for a law enforcement agency. We currently have one...
Suppose that our company performs DNA analysis for a law enforcement agency. We currently have one machine that is essential to performing the analysis. When an analysis is performed, the machine is in use for a third of the day. Thus, each machine can perform at most THREE DNA analyses per day. Based on past experience, the distribution of analyses needing to be performed on any given day are as follows: (Fill in the table for any hope of credit.)...
please answer all 15 questions if u cant answer all then please let someone else answer...
please answer all 15 questions if u cant answer all then please let someone else answer it. thanks. Histones are proteins associate with which of the following? Blood Hair Follicle DNA Sperm Skip Which of the following organs releases Bicarbonate as a response release of secretine by duodenum? Liver Pancreas Gall Bladder Spleen Which of the following describes a process that occurs along the proximal tubules of nephron? Toxins in the filtrate are detoxified Glucose, lactate, and amino acids are...
Here is all of the info for these questions. Please do not answer these questions if...
Here is all of the info for these questions. Please do not answer these questions if you do not know what you are doing I have gotten a lot of wrong answers and have burned a lot of my questions on false answers. This is for a managerial accounting class. Thank you for your help. Preble Company manufactures one product. Its variable manufacturing overhead is applied to production based on direct labor-hours and its standard cost card per unit is...
Please answer all discussion questions and answer the case study questions. Discussion Topic: Are the cognitive...
Please answer all discussion questions and answer the case study questions. Discussion Topic: Are the cognitive skills of a child affected by their nutrition? Discussion Topic: What is the primary cause of fatal ingestions in children younger than 5 years of age? Discuss button battery ingestion. Case Study: Sally is a 3-year-old girl in the primary care physician’s office. Sally’s mother states that she is having “temper tantrums.” Subjective Data Mother states Sally eats well. Sally sleeps 11 to 12...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT