Chapter 3 Flashcards
What’s the main goal of a static acquisition?
to preserve the digital evidence.
Name three formats of digital forensics acquisitions.
Raw Format, Proprietary Formats, Advance Forensic Format
What are two advantages and disadvantages of the raw format?
fast data transfers and capability to ignore minor data read errors on the source drive, Requires as much storage space as the original disk or that it might not collect marginal (bad) sectors on the source drive.
List two features common with proprietary format acquisition files.
to compress or not to compress, Capability to split an image into smaller segmented files, Capability to integrate metadata into the image file ( date and time, hash values).
Of all the proprietary formats, which one is the unofficial standard?
Expert Witness Format
Name two commercial tools that can make a forensic sector-by-sector copy of a drive to a larger drive.
EnCase, SafeBack, and SnapCopy
What does a logical acquisition collect for an investigation?
only specific files of interest to the case
What does a sparse acquisition collect for an investigation?
fragments of unallocated data in addition to the logical allocated data
What should you consider when determining what data acquisition method to use?
size of the source drive, whether the source drive be retained as evidence, how long the acquisition will take, and where the disk evidence is located
Why is it a good practice to make two images of a suspect drive in a critical investigation?
to ensure at least one good copy of the forensically collected data in case of any failures
When you perform an acquisition at a remote location, what would you consider to prepare for this task?
determining whether there’s sufficient electrical power and lighting and checking the temperature and humidity at the location
With newer Linux kernel distributions, what happens if you connect a hot-swappable device, such a USB drive, containing evidence?
Newer Linux distributions automatically mount the USB device, which could alter data on it.
n a Linux shell the fdisk -1 command lists the suspect drive as /dev/hda1. Is the following dcfldd command correct?
dcfldd if=image_file.img of=/dev/sha1.
False
The correct command is dcfldd if=/dev/hda1 of=image_file.img. If performing the other command without a write blocker could alter the data and thus remove that evidence from existence in a case if no write blocker was used.
What is the most critical aspect of computer evidence?
validation
What is a hashing algorithm?
A program designed to create a binary or hexadecimal number that represents the uniqueness of a data set, file, or entire disk
The Linux dcfldd command, which tree options are used for validation data?
hash=, hashlog=, and vf=