Cengage Chapter 6 - Current Digital Forensics Tools Flashcards

1
Q

The process of creating a duplicate image of data; one of the required functions of digital forensics tools.

A

acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of trying every combination of characters—letters, numbers, and special characters typically found on a keyboard—to find a matching password or passphrase value for an encrypted file.

A

brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A project sponsored by the National Institute of Standards and Technology to manage research on digital forensics tools.

A

Computer Forensics Tool Testing (CFTT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of pulling relevant data from an image and recovering or reconstructing data fragments; one of the required functions of digital forensics tools.

A

extraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A method of finding files or other information by entering relevant characters, words, or phrases in a search tool.

A

keyword search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A NIST project with the goal of collecting all known hash values for commercial software and OS files.

A

National Software Reference Library (NSRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack that uses a collection of words or phrases that might be passwords for an encrypted file. Password recovery programs can use a ________________ to compare potential passwords to an encrypted file’s password or passphrase hash values.

A

password dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of rebuilding data files; one of the required functions of digital forensics tools.

A

reconstruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A way to confirm that a tool is functioning as intended; one of the functions of digital forensics tools.

A

validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of proving that two sets of data are identical by calculating hash values or using another similar method.

A

verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A hardware device or software program that prevents a computer from writing data to an evidence drive. Software write-blockers typically alter interrupt-13 write functions to a drive in a PC’s BIOS. Hardware write-blockers are usually bridging devices between a drive and the forensic workstation.

A

write-blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly