0
0
Cybersecurityknowledge~5 mins

Memory forensics basics in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is memory forensics?
Memory forensics is the process of analyzing a computer's memory (RAM) to find evidence of malicious activity or understand system behavior.
Click to reveal answer
beginner
Why is RAM important in memory forensics?
RAM holds data about running programs and system state, including malware that may not be saved on disk, making it crucial for detecting live threats.
Click to reveal answer
beginner
Name a common tool used for memory acquisition.
Volatility and FTK Imager are popular tools used to capture the contents of RAM for analysis.
Click to reveal answer
intermediate
What kind of information can memory forensics reveal?
It can reveal running processes, network connections, loaded drivers, passwords in memory, and evidence of malware or hacking activity.
Click to reveal answer
beginner
What is a memory dump?
A memory dump is a snapshot of the contents of RAM at a specific time, saved to a file for later forensic analysis.
Click to reveal answer
What does memory forensics primarily analyze?
ANetwork traffic
BContents of RAM
CHard drive files
DEmail logs
Which tool is commonly used to capture memory for analysis?
ANmap
BWireshark
CVolatility
DMetasploit
Why might malware be found in RAM but not on disk?
AMalware runs only in memory and does not save files
BMalware deletes itself from disk immediately
CDisk is always encrypted
DRAM is slower than disk
What is a memory dump?
AA backup of hard drive
BA list of installed software
CA log of network activity
DA snapshot of RAM contents
Which of these can memory forensics help identify?
ARunning processes
BDeleted emails
CPhysical hardware faults
DPrinter settings
Explain what memory forensics is and why it is useful in cybersecurity investigations.
Think about what data lives in RAM and how it helps find live threats.
You got /3 concepts.
    Describe the process and purpose of creating a memory dump.
    Consider how capturing RAM contents helps forensic experts.
    You got /3 concepts.