IR Life Cycle
Tools
Evidence Handling
Apps
100

The first phase of the Incident Responds Life Cycle.

What is the preparation phase?

100

Its the free tool used to acquire physical images of hard drives and flash drives and memory.

What is FTK Imager?

100

This term refers to always documenting where evidence is - knowing who has it and when - to maintain integrity.

What is Chain of Custody?

100

Apps on smartphones are contained in these - like where small children play.

What is a sandbox?

200
It is phase 2 of the Incident Response Life Cycle.

What is the Detection Phase?

200

This open source tool created as a masters thesis project can extract the content from iPhones.

What is UFADE?

200

To protect a smartphone from being remotely wiped, this should be enabled to prevent it from obtaining signal.

What is Airplane mode?
200

These types of files store configuration and settings information for smartphone apps on iPhones.

What are plists or property lists?

300

The phase in the IR life cycle that ensures that the threat does not move anywhere else in the organization.

What is the containment phase?

300
Its a password cracking tool that can be used to crack locked Apple Notes.

What is Hashcat?

300

These devices that look like pouches can be used to hold smartphones to prevent them from sending and receiving data.

What are Faraday bags?

300

These files can become quite large and store bulk data from smartphone apps, especially communication apps that have contacts, calls, and messages.

What are databases?

400

The last phase of the incident response life cycle.

What is the Lessons Learned phase?

400

The environment used to analyze Malware on windows - launched in a virtual machine.

What is FlareVM?

400

You should wear these to make sure not to disturb fingerprints that might be found on evidence. 

What gloves?

400

An popular encoding scheme used to store data in smartphone apps. You know it is being used when you see a JPG that starts with /9j/. 

What is base64?

500

A game organizations play to simulate attacks to practice the IR life cycle to help in preparation of an attack.

What are tabletop exercises?

500

This tool can be used to find deleted files in images and devices.

What is QPhotorec or Photorec?

500

This is often referred to as a digital thumbprint and a way to identify if a file has been altered.

What are Hash Values?

500

This uniquely identifies a file as all files have one - usually the first few bytes.

What is a file signature or magic bytes?

M
e
n
u