Ch. 4 Flashcards
Investigators need to ensure that an acquisition methodology used is forensically sound. Specifically, the acquisition methodology adopted must be _________.
verifiable and repeatable
What are the freeware tools that support Raw Format?
- dd
- dc3dd
- dcfldd
Because they are always changing, the information in the registers or the processor cache are the most volatile data. True/False.
True. The information in the registers or the processor cache on computers exists for nanoseconds. They are constantly changing and are the most volatile data.
What is the process of permanently deleting or destroying data from storage media?
Media sanitization
The process of acquiring volatile data from working computers (locked or in sleep condition) that are already powered on is ________.
live data acquisition
What is the data called that is stored in the registries, cache, and RAM of digital devices?
Volatile information
What are some measures that provide defense mechanisms against evidence alterations?
- Set a hardware jumper to make the disk read-only
- Use operating system and software that cannot write to the disk unless instructed
- Employ a hard disk write block tool to protect against disk writes
Investigators can copy smaller redundant array of independent disks (RAID) systems into a single large disk if large storage disks are available and can be used immediately. True/False.
True
Hash value calculations generate a unique numerical value for files, which is often considered a digital footprint that represents the uniqueness of a file or disk drive. What are some hashing algorithms?
- MD5
- SHA-1
- CRC-32