Ch. 4 Flashcards

1
Q

Investigators need to ensure that an acquisition methodology used is forensically sound. Specifically, the acquisition methodology adopted must be _________.

A

verifiable and repeatable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the freeware tools that support Raw Format?

A
  • dd
  • dc3dd
  • dcfldd
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Because they are always changing, the information in the registers or the processor cache are the most volatile data. True/False.

A

True. The information in the registers or the processor cache on computers exists for nanoseconds. They are constantly changing and are the most volatile data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the process of permanently deleting or destroying data from storage media?

A

Media sanitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of acquiring volatile data from working computers (locked or in sleep condition) that are already powered on is ________.

A

live data acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the data called that is stored in the registries, cache, and RAM of digital devices?

A

Volatile information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some measures that provide defense mechanisms against evidence alterations?

A
  • Set a hardware jumper to make the disk read-only
  • Use operating system and software that cannot write to the disk unless instructed
  • Employ a hard disk write block tool to protect against disk writes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Investigators can copy smaller redundant array of independent disks (RAID) systems into a single large disk if large storage disks are available and can be used immediately. True/False.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hash value calculations generate a unique numerical value for files, which is often considered a digital footprint that represents the uniqueness of a file or disk drive. What are some hashing algorithms?

A
  • MD5
  • SHA-1
  • CRC-32
How well did you know this?
1
Not at all
2
3
4
5
Perfectly