What determines the source, nature, and time of an attack on a compromised system?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

What determines the source, nature, and time of an attack on a compromised system?

Explanation:
Analyzing log files is how you uncover where an attack came from, what was done, and when it happened. Logs from the operating system, applications, security tools, and network devices record events with timestamps, user accounts, and the sources of access. By inspecting these entries, you can identify the origin of the intrusion—such as a specific IP address or remote host—and trace the path the attacker took, including failed logins, unusual privilege escalations, new user creation, and unusual file access or data transfers. The sequence and timing of these events across different systems let you reconstruct a timeline of the attack, showing both the nature of the intrusion (for example, brute-force attempts, malware installation, or lateral movement) and the exact moments actions occurred. Other options don’t provide this combination of source, action type, and timing. The SAM file stores local account credentials and password hashes, useful for password-related investigations but not for detailing how an attack unfolded on a compromised system. Rainbow tables are a tool for reversing password hashes and don’t describe attack activity or timing. Hard disk boot records pertain to the system’s startup sequence and won’t reliably reveal post-compromise activity or timelines.

Analyzing log files is how you uncover where an attack came from, what was done, and when it happened. Logs from the operating system, applications, security tools, and network devices record events with timestamps, user accounts, and the sources of access. By inspecting these entries, you can identify the origin of the intrusion—such as a specific IP address or remote host—and trace the path the attacker took, including failed logins, unusual privilege escalations, new user creation, and unusual file access or data transfers. The sequence and timing of these events across different systems let you reconstruct a timeline of the attack, showing both the nature of the intrusion (for example, brute-force attempts, malware installation, or lateral movement) and the exact moments actions occurred.

Other options don’t provide this combination of source, action type, and timing. The SAM file stores local account credentials and password hashes, useful for password-related investigations but not for detailing how an attack unfolded on a compromised system. Rainbow tables are a tool for reversing password hashes and don’t describe attack activity or timing. Hard disk boot records pertain to the system’s startup sequence and won’t reliably reveal post-compromise activity or timelines.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy