SECTION A: Scenario-Based Questions
Question 1: Reconnaissance and Active Attacks
A large enterprise experiences recurring brute-force login attempts originating from multiple IP
addresses.
(a) Identify the reconnaissance techniques likely used before launching these attacks. [4 marks]
(b) Describe the steps involved in detecting and mitigating such brute-force attacks. [4 marks]
(c) Explain how to differentiate between legitimate login failures and brute-force attempts
using logs.
[2 marks]
Question 2: Evidence Acquisition from Host Systems
You are part of a digital forensics response team investigating insider threats at a public-sector
institution.
(a) Outline the correct procedure for acquiring host-based evidence while ensuring forensic integrity.
[6 marks]
(b) Highlight three challenges specific to acquiring volatile memory from running systems.
[4 marks]
Question 3: Network Log Evaluation for Insider Threats
An internal user is suspected of data exfiltration using non-standard ports.
(a) What specific signs would you look for in firewall and NetFlow logs?
{b) Describe how deep packet inspection can assist in confirming the exfiltration.
[S marks]
[5 marks]
Question 4: Memory Analysis for Detection of Fireless Malware
Fileless malware was suspected in a recent targeted breach of a legal firm.
(a) Discusshow fileless malware typically operates and avoids detection.
[S marks]
(b) Explain how tools like Volatility can help uncover the presence of fileless malware in system
memory.
[S marks]
Page 2