Chapter 3 Flashcards

1
Q

What is the term for the unused space between the logical end of file and the physical end of file on a disk?

A

File slack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of the principle that states that you cannot interact in an environment without leaving some trace?

A

Locard’s principle of transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the Federal Rules of Evidence (FRE)?

A

Both A and B
A - To govern the admission of facts in U.S. federal court cases
B - To provide guidelines for the authentication and identification of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Rule 901 of the FRE require for the authentication or identification of an item of evidence?

A

A - Sufficient evidence to support a finding that the item is what the proponent claims it is
B - Testimony that an item is what it is claimed to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Item 1 in the Federal Rules of Evidence (FRE) refer to?

A

Expert testimony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the significance of Item 9 in the FRE for computer forensics?

A

B - It emphasizes understanding how the tools work
C - It is critical for authenticating the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the first step in collecting evidence according to the order of volatility?

A

Collecting data from registers and cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does volatility refer to in the context of digital forensics?

A

The ease with which data can change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is RFC 3227?

A

A document that presents guidelines for evidence collection and archiving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the life span of information stored in computer memory?

A

1 millisecond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the six classes in the DFRWS framework?

A

Identification, Preservation, Collection, Examination, Analysis, Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the primary phases of the Event-Based Digital Forensics Investigation Framework?

A

Readiness, Deployment, Physical Crime Scene Investigation, Digital Crime Scene Investigation, Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is file slack a potential security risk?

A

It contains residual information that is not necessarily overwritten when a new file is created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three basic tasks related to handling evidence for a system forensics specialist?

A

Finding, preserving, and preparing evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the first step in any forensic investigation?

A

Making a copy of the suspected storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an expert report?

A

A document that details the expert’s findings
A document that lists all items, documents, and evidence considered by the expert
A document that details tests performed, analysis done, and conclusions drawn by the expert

17
Q

What is ISO/IEC 27037:2012?

A

It’s a standard for digital forensics.

18
Q

What does ISO/IEC 27041:2015 provide guidance on?

A

Forensics methods and tools.

19
Q

What organization has a Computer Forensics Tool Testing Program?

A

National Institute of Standards and Technology.

20
Q

What is TEMPEST?

A

It’s a certification for equipment with EMR shielding.

21
Q

What is EnCase?

A

A forensic toolkit from Guidance Software

22
Q

What does EnCase use to verify the integrity of the entire disk image?

A

MD5 hash

23
Q

What is Forensic Toolkit (FTK) particularly useful for?

A

Cracking passwords

24
Q

What does FTK provide tools to search and analyze?

A

Windows Registry

25
Q

What is the purpose of Helix (for Linux only) in computer forensics?

A

To perform analysis on a suspect system

26
Q

What is one of the main functions of AnaDisk?

A

Analyzing disks for anomalies

27
Q
A