Questions
Answer the following questions to test your knowledge of this chapter:
- What are some of the data points that can be found via memory analysis?
- Running processes
- Network connection
- Command history
- All of the above
- What is not part of the network connections methodology?
- Process name
- Parent process ID
- Check for signs of a rootkit
- Associated entities
- Dumping files associated with a process will never introduce malware into a responder’s system.
- True
- False
- One of the primary goals of memory analysis is to acquire malicious processes or executables for further analysis.
- True
- False