In this module

IR1.13 Check My Knowledge

90-120 minutes · Module 1 · Free

Check My Knowledge

1. Why must the forensic workstation be a separate machine from the compromised system?

The compromised system may be too slow to run analysis tools
Running analysis on the compromised system contaminates the evidence — every tool installation, file access, and query modifies the artifacts you are trying to analyze
Forensic tools only run on Windows Server, not Windows 10
The compromised system's antivirus will block forensic tools

2. What is the primary advantage of KAPE triage collection over full disk imaging?

KAPE collects forensically relevant artifacts in 2-5 minutes instead of 45-90 minutes for a full image, allowing the investigation to start sooner
KAPE is free while disk imaging tools cost money
KAPE output is more accurate than a full disk image
KAPE does not require administrator privileges

3. Which EZTools parser would you use to determine when a specific program was executed and how many times?

EvtxECmd
PECmd (Prefetch parser)
MFTECmd
Registry Explorer

4. What does Velociraptor provide that KAPE does not?

Better parsing of Windows artifacts
Memory forensics capabilities
Remote evidence collection across the network without physically accessing the endpoint, and enterprise-wide hunting across all connected clients
Integration with Microsoft Defender

5. Why is memory forensics essential for investigating modern attacker tooling like Cobalt Strike?

Memory forensics is faster than disk forensics
Cobalt Strike cannot run on Windows systems with disk encryption
Cobalt Strike beacons are loaded reflectively into memory — no file is written to disk, no Prefetch entry is created, and no registry key is modified, making the implant invisible to disk-based forensic analysis
Memory forensics can recover encrypted files

6. What is the correct order of evidence collection priority according to the jump bag checklist?

Memory → network connections → KAPE triage → M365 audit → full disk image
Full disk image → KAPE triage → memory → M365 audit → network connections
M365 audit → KAPE triage → memory → full disk image → network connections
Network connections → full disk image → memory → KAPE triage → M365 audit

7. You need to revoke a compromised user's active sessions immediately. Which PowerShell command accomplishes this?

Set-MgUser -AccountEnabled:$false
Remove-InboxRule -Identity "malicious rule"
Revoke-MgUserSignInSession — this forces re-authentication and breaks stolen session tokens
Disconnect-ExchangeOnline

8. What is the purpose of hashing all tool binaries in the jump bag?

To speed up tool execution on the target system
To verify tool integrity — if hashes change, the USB may have been tampered with or corrupted, and the tools cannot be trusted
To comply with software licensing requirements
To allow antivirus to whitelist the tools

9. A developer tenant for M365 is being used as the course lab. Which critical audit capability requires E5 licensing to function?

Basic sign-in log access
Defender XDR Advanced Hunting
MailItemsAccessed — the Purview audit event that records exactly which email messages were read by a user or application
PowerShell remoting to Exchange Online

10. How often should the jump bag be tested?

Only after a tool update
Monthly — verify tool hashes, run each tool to confirm it executes, check for updates, and verify credential access
Annually during the IR plan review
Only before a known incident

11. A compromised server has application whitelisting that blocks KAPE and Velociraptor from executing. What is your best approach for evidence collection?

Use native Windows commands (Get-CimInstance, Get-NetTCPConnection, Get-ScheduledTask, Get-WinEvent, wevtutil) to collect processes, network connections, persistence mechanisms, and event logs — then export the .evtx files for EvtxECmd analysis on the forensic workstation
Wait until the whitelisting policy can be modified to allow KAPE
Take a full disk image instead
Ask the user to describe what they observed

12. What does Hayabusa provide that EvtxECmd does not?

Hayabusa parses more event log formats than EvtxECmd
Hayabusa is faster at parsing event logs
Hayabusa applies 4,000+ Sigma detection rules to event logs and outputs only the events matching known attack patterns — providing threat detection rather than comprehensive parsing
Hayabusa produces better CSV output for Timeline Explorer

13. What is the primary advantage of Magnet AXIOM Cyber over the free toolkit (KAPE + EZTools + Velociraptor + Volatility)?

AXIOM Cyber produces more accurate forensic findings
AXIOM Cyber unifies acquisition, parsing, analysis, and reporting from computer, cloud, and mobile sources in a single platform — eliminating the tool-orchestration overhead the free toolkit requires
AXIOM Cyber is required for court-admissible evidence
AXIOM Cyber detects threats that free tools cannot
💬

How was this module?

Your feedback helps us improve the course. One click is enough — comments are optional.

Thank you — your feedback has been received.

You've finished the free tier. The investigation starts now.

IR0 established the incident shape — how Microsoft-stack attacks cross the cloud-endpoint boundary in minutes — and gave you the five-step reasoning chain and three-statement evidence discipline that every subsequent module applies. IR0 also covered the current NIST SP 800-61 Rev 3 / CSF 2.0 vocabulary for the reports you will write. IR1 got your forensic workstation built: KAPE, the Eric Zimmerman Tools suite, Velociraptor, Volatility 3, and the Microsoft 365 investigation stack installed, validated, and ready. From here, every module applies the reasoning chain against real evidence.

  • Phase 2 — Windows Endpoint Forensics (IR2–IR7) — evidence acquisition and chain of custody, execution and persistence artefacts, filesystem and registry forensics, event log analysis, memory forensics with Volatility 3, lateral movement and credential theft
  • Phase 3 — Microsoft 365 Cloud Investigation (IR8–IR12) — identity compromise, Exchange Online and email forensics, SharePoint/OneDrive/Teams investigation, Entra ID persistence, Defender XDR as the unified investigation platform
  • Phase 4 — Investigation Scenarios (IR13–IR16) — ransomware, business email compromise, insider threat, and advanced persistent threat. Each a complete worked investigation integrating Phase 2 and Phase 3 skills
  • Phase 5 — Reporting, Readiness, and Capstone (IR17–IR19) — technical and executive reporting, regulatory notifications under current law (GDPR, NIS2, SEC), IR readiness building, and the IR19 end-to-end capstone investigation
  • Worked practical content throughout — every content subsection contains annotated KQL queries, walked-through tool output, real artefact data with interpretation, and procedures you run yourself
Unlock the full course with Premium See Full Syllabus