Ch. 5 Flashcards
Where are deleted items stored on Windows Vista and later versions of Windows?
Drive:$Recycle.Bin
Where are deleted items stored on Windows 98 and earlier versions of Windows?
Drive:\RECYCLED
Where are deleted items stored on the Windows 2000, XP, and NT versions of Windows?
Drive:\RECYCLER
What is the maximum size limit for the Recycle Bin in Windows prior to Windows Vista?
3.99 GB
Recover My Files Features:
- Recovers files even if emptied from Recycle Bin data
- Recovers files after accidental format, even after Windows is reinstalled
- Performs disk recovery after a hard disk crash
- Recovers files after a partitioning error
- Recovers data from RAW hard drives
- Recovers documents, photos, videos, music, and email
- Recovers from a hard drive, camera card, USB, Zip, floppy disk, or other media
What tool is used for format recovery, unformatting and recovering deleted files emptied from the Recycle Bin, or data lost due to partition loss or damage, software crash, virus infection, or unexpected shutdown and supports hardware RAID?
EaseUS
What tool undeletes and recovers lost files from hard drives, memory cards, and USB flash drives?
DiskDigger
What tool recovers files that have been lost, deleted, corrupted, or even deteriorated?
Quick Recovery
What tool recovers lost data from hard drives, RAID, photographs, deleted files, iPods, and removable disks connected via FireWire or USB?
Total Recall
What tool scans an entire system for deleted files and folders and recovers them, providing two types of scans: a quick scan and a deep scan?
Advanced Disk Recovery
What tool for Mac recovers files from a crashed or virus-corrupted hard drive and can recover all file types from any HFS/HFS+ formatted drive?
Data Rescue 4
What anti-forensics technique is used to hide secret data within ordinary data, thereby hiding the existence of such data?
Steganography
What is the process of applying a strong magnetic field to a storage device, resulting in a device entirely clean of any previously stored data?
Disk degaussing
What process does not erase the data present on a disk but wipes its address tables and unlinks all the files in the file system?
Formatting of a hard drive
What process involves erasing data from a disk by deleting its links to memory blocks and overwriting the memory contents?
Disk wiping
What password-cracking technique requires more processing power compared to other attacks?
Brute-forcing attack
What kind of attack is used when some information about the password is known?
Rule-based
What is a precomputed table that contains word lists in the form of dictionary files and brute-force lists and their hash values?
Rainbow
Methods to Bypass/Reset BIOS password
- Using a manufacturer’s backdoor password to access the BIOS
- Using password cracking software
- Resetting the CMOS using jumpers or solder beads
- Removing the CMOS battery for at least 10 minutes
What is a set of techniques that attackers use in order to avert the forensics investigation process and negatively affect the quantity and quality of evidence?
Anti-forensics
In the File Allocation Table (FAT) file system, what does the OS replace the first letter of a deleted file name with a hex byte code of?
E5h