{"id":114619,"date":"2023-08-22T09:46:36","date_gmt":"2023-08-22T09:46:36","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=114619"},"modified":"2023-08-22T09:46:38","modified_gmt":"2023-08-22T09:46:38","slug":"wgu-c842-cyber-defense-and-counter-measures-ec-council-certified-incident-handler-cih-tools-and-commands-c842-cyber-defense-and-counter-measures-ec-council-certified-incident-handler-cih-tools-and-com","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/22\/wgu-c842-cyber-defense-and-counter-measures-ec-council-certified-incident-handler-cih-tools-and-commands-c842-cyber-defense-and-counter-measures-ec-council-certified-incident-handler-cih-tools-and-com\/","title":{"rendered":"WGU C842 Cyber Defense and Counter measures EC Council Certified Incident Handler CIH Tools and Commands C842 Cyber Defense and Counter measures EC Council Certified Incident Handler CIH Tools and Commands"},"content":{"rendered":"\n<p>1 \/ 15<br>C842 Cyber Defense and Counter measures EC Council CertifiedIncident Handler CIH Tools and Commands<br>1.PILAR: Risk analysis and Management tool<br>2.Pilar: Assess risk against critical assets. Qualitative and quantitative.<br>Generate risk assessment reports<br>3.Group Policy Management console: Security policy Tools<br>4.Manageengine \u2026 plus: Ticketing system Tools<br>5.Alien vault: Ticketing system Tools<br>6.Busk-security: Incident analysis and validation Tools<br>7.Busk-security: Collection of security checks for Linux. Identify securitystatus.<br>8.kiwi syslog: Incident analysis and validation Tools<br>9.Splunk light: Incident analysis and validation Tools<br>10.kiwi syslog: message Management tool across servers and network<\/p>\n\n\n\n<p>2 \/ 15<br>devices. Syslog messages, SNMP traps, event log, real time<br>11.Splunk light: Collecting monitoring analyzing low from servers<br>applications and other sources.<br>12.Microsoft Baseline Security Analyzer (MBSA): Tools for detecting<br>missing security patches<br>13.Microsoft Baseline Security Analyzer (MBSA): Determine security<br>State. Scan for missing patches and misconfigs.<br>14.Magic tree: Report writing tools<br>15.Keepnote: Report writing tools<br>16.FTK\u2026: Data Imaging Tools<br>17.FTK Imager: data preview and imaging tool that enables analysis of<br>files and folders on local hard drives, CDs\/DVDs, network drives, and<br>examination of the content of forensic images or memory dumps<br>18.R-Drive\u2026: Data Imaging Tools<br>19.R-Drive\u2026: provides creation of disk image files for backup or<br>duplication purposes. restores the images on the original disks, on<br>any other partitions, or even on a hard drive&#8217;s free space. one can<\/p>\n\n\n\n<p>3 \/ 15<br>restore the system after heavy data loss caused by an operating<br>system crash, virus attack, or hardware failure<br>20.\u00b7 EnCase Forensic<br>Data Acquisition<br>Toolbox<br>\u00b7 RAID Recovery for Windows<\/p>\n\n\n\n<p>4 \/ 15<br>\u00b7 R-Tools R-Studio<br>F-Response Imager: Data Imaging Tools<br>21.HashCalc: Image Integrity Tools<br>22.HashCalc: compute multiple hashes, checksums, and HMACs for<br>files, text, and hex strings.<br>23.MD5 Calculator: Image Integrity Tools<br>24.MD5 Calculator: calculating the MD5 hash value of the selected file<br>25.HashMyFiles: Image Integrity Tools<br>26.HashMyFiles: small utility that allows to calculate the MD5 and<br>SHA1 hashes of one or more files in the system. It allows copying of<br>the MD5\/SHA1 hashes list into the clipboard or save them into<br>text\/html\/xml file<br>27.PsUptime (Windows): \u00b7 Shows system uptime<br>28.Net Statistics (Windows): \u00b7 Shows system uptime<br>29.Uptime and W (Linux): \u00b7 Shows system uptime<br>30.Netstat -ab (Windows): determine all the executable files for running<br>process- es<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 \/ 15C842 Cyber Defense and Counter measures EC Council CertifiedIncident Handler CIH Tools and Commands1.PILAR: Risk analysis and Management tool2.Pilar: Assess risk against critical assets. Qualitative and quantitative.Generate risk assessment reports3.Group Policy Management console: Security policy Tools4.Manageengine \u2026 plus: Ticketing system Tools5.Alien vault: Ticketing system Tools6.Busk-security: Incident analysis and validation Tools7.Busk-security: Collection of security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-114619","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/114619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=114619"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/114619\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=114619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=114619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=114619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}