Chapter 3 Flashcards
What is the term for the unused space between the logical end of file and the physical end of file on a disk?
File slack
What is the name of the principle that states that you cannot interact in an environment without leaving some trace?
Locard’s principle of transference
What is the purpose of the Federal Rules of Evidence (FRE)?
Both A and B
A - To govern the admission of facts in U.S. federal court cases
B - To provide guidelines for the authentication and identification of evidence
What does Rule 901 of the FRE require for the authentication or identification of an item of evidence?
A - Sufficient evidence to support a finding that the item is what the proponent claims it is
B - Testimony that an item is what it is claimed to be
What does Item 1 in the Federal Rules of Evidence (FRE) refer to?
Expert testimony
What is the significance of Item 9 in the FRE for computer forensics?
B - It emphasizes understanding how the tools work
C - It is critical for authenticating the process
What is the first step in collecting evidence according to the order of volatility?
Collecting data from registers and cache
What does volatility refer to in the context of digital forensics?
The ease with which data can change
What is RFC 3227?
A document that presents guidelines for evidence collection and archiving
What is the life span of information stored in computer memory?
1 millisecond
What are the six classes in the DFRWS framework?
Identification, Preservation, Collection, Examination, Analysis, Presentation
What are the primary phases of the Event-Based Digital Forensics Investigation Framework?
Readiness, Deployment, Physical Crime Scene Investigation, Digital Crime Scene Investigation, Presentation
Why is file slack a potential security risk?
It contains residual information that is not necessarily overwritten when a new file is created
What are the three basic tasks related to handling evidence for a system forensics specialist?
Finding, preserving, and preparing evidence
What is the first step in any forensic investigation?
Making a copy of the suspected storage device