A security analyst identified some potentially malicious processes after capturing the contents of memory from a machine during incident response. Which of the following procedures is the NEXT step for further investigation?
I studied Dion's course and I'm pretty sure this is B !!! I'm surprised no one says B! :o
Reverse Engineering is to understand how a CODE works. Here we identified some "malicious processes" you dont Reverse Engineer a process! to further investigate the MALICIOUS PROCESSES you must build a Timeline.
Timeline
Tool that shows the sequence of file system events within a source image
▪ How was access to the system obtain?
▪ What tools have been installed?
▪ What changes to files were made?
▪ What data has been retrieved?
▪ Was data exfiltrated?
The NEXT step for further investigation after identifying potentially malicious processes in memory during incident response would typically be:
B. Timeline construction
B. Timeline construction
In incident response, especially after capturing the contents of memory (also known as a memory dump) and identifying potentially malicious processes, constructing a timeline is typically a crucial next step.
File (Data) carving is the process of extracting data from an image (from a computer) when that data has no associated file system metadata.
A file-carving tool analyzes the disk at sector/page level and attempts to piece together data fragments from unallocated and slack space to reconstruct deleted files, or at least bits of information from deleted files.
In real world, once you identified a malicious file/process, security analysts will first check for other artifacts associated to it through reverse engineering. At later stages, once all IOCs were analyzed, timeline construction will be part of the reporting to get a view of the whole picture.
File cloning is of course not an option.
Data carving is a technique used to extract specific file types from a larger data set or volume. While it can be useful in certain investigations, it may not be the most appropriate next step for further investigation if the security analyst has already identified potentially malicious processes. In this case, the next step for further investigation could be to construct a timeline of events or to perform file cloning to further analyze the suspicious processes. Reverse engineering could also be a potential option if the security analyst has the necessary skills and resources.
D... if I had to choose from this mess. If reverse engineering means analyzing the captured processes, then D it is. Timeline construction would be a part over the overall reporting process of IR. Data carving is carving (putting together) files from a HD or SSD.
Therefore, option B is the correct answer. Timeline construction involves identifying and documenting the sequence of events and actions that occurred on the system leading up to the incident. This process provides a clear picture of the actions taken by the attacker and the steps they took to achieve their goals. By reconstructing the timeline of events, the security analyst can identify patterns of activity that may help to identify the root cause of the incident and the extent of the compromise.
In book glossary;
reverse engineering:The process of analyzing the structure of hardware or software to reveal more about how it functions.
Analyst already identified some malicious process, i think next step perform reverse engineering this process.
Data carving already performed.
A. Data carving is a process used to extract files from unallocated space on a hard drive, which can be useful for discovering deleted files or hidden data. However, in this scenario, the security analyst has already captured the contents of memory from the machine, so data carving would not be the next step. Data carving would be useful in cases where the analyst is trying to recover data that was deleted or hidden by an attacker, but in this scenario, the focus is on analyzing the potentially malicious processes that were identified in memory, which would be best accomplished through reverse engineering.
This section is not available anymore. Please use the main Exam Page.CS0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Aliyan
Highly Voted 2 years agozecomeia_007
Most Recent 10 months, 4 weeks agoRobV
1 year, 7 months ago32d799a
1 year, 8 months agoChilaqui1es
1 year, 9 months agoAbdallaAM
1 year, 10 months agokumax
1 year, 10 months agoBig_Dre
1 year, 11 months agoPavel019846457
1 year, 11 months agokhrid4
2 years, 4 months agotatianna
2 years, 4 months ago2Fish
2 years, 4 months agodb97
2 years, 5 months agoencxorblood
2 years, 5 months agoabsabs
2 years, 5 months agoEric1234
2 years, 6 months agokmanb
2 years, 6 months ago