Chapter 3 Handling Computer Hardware Flashcards

1
Q

What is the importance of recognizing different types of computer hardware in digital forensics?

A

It is crucial for understanding compatibility with software, operating systems, and file systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What utility allows Intel-based Macs to run Windows operating systems?

A

Boot Camp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does SCSI stand for?

A

Small Computer System Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one key advantage of SCSI?

A

Facilitates high rates of data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: SCSI devices can be daisy-chained together.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does IDE stand for in computer hardware?

A

Integrated Drive Electronics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary limitation of IDE compared to SATA?

A

Uses a parallel data transfer method, which is slower than SATA’s serial method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SATA stand for?

A

Serial ATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List three key advantages of SATA over IDE.

A
  • Faster data transfer
  • Improved cable design
  • Dedicated bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between a disk clone and a disk image?

A

A disk clone is a bootable exact copy, while a disk image is a non-bootable file containing bit-for-bit copies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of the Host Protected Area (HPA) in hard disks?

A

Contains code associated with the BIOS for booting and recovery purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main function of garbage collection in solid state drives (SSDs)?

A

Removes unused files to make more memory available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: RAM is _______ memory used for processes currently running on a computer.

A

volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is RAID an acronym for?

A

Redundant Array of Independent Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is FireWire used for?

A

High-speed data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: USB flash drives typically use the NTFS file system.

A

False (they typically use FAT file system)

17
Q

What is the maximum number of devices that can be connected to an IDE controller?

A

Four devices

18
Q

What is the standard size of a MultiMediaCard (MMC)?

A

24mm × 32mm × 1.4mm

19
Q

What is the function of the File Translation Layer (FTL) in SSDs?

A

Maps a logical block address to a physical block address.

20
Q

What should always be carried as a backup imaging tool during forensic investigations?

A

A write-blocker

21
Q

What type of cable design does SATA use compared to IDE?

A

Thinner, more flexible cable

22
Q

What is the primary use of the Disk Jockey PRO Forensic Edition?

A

Cloning hard disk drives

23
Q

List two types of external hard drives.

A
  • USB-powered
  • Adapter-powered
24
Q

What is TRIM in the context of SSDs?

A

An OS function that informs an SSD of blocks no longer in use.

25
What is a key challenge in recovering deleted files on SSDs?
Garbage collection
26
What is the purpose of Digital Intelligence’s UltraBlock Forensic Card Reader and Writer?
To securely view the contents of flash memory cards ## Footnote It connects to a computer via the USB port and supports various media types.
27
List the types of media that the UltraBlock Forensic Card Reader and Writer can read.
* CompactFlash * MicroDrive * Memory Stick * Memory Stick PRO * Smart Media Card * xD Picture Card * Secure Digital Card (SD and SDHC) * MultiMedia Card ## Footnote These media types are commonly used in digital devices.
28
What is the function of a USB write-blocker?
To prevent writing to a device while reading data ## Footnote This ensures that the integrity of the data is maintained during forensic analysis.
29
How can an investigator view or acquire the contents of a media card?
By connecting a media card reader to a USB write-blocker ## Footnote This setup allows safe data acquisition without altering the original data.
30
What is an example of a write-blocker that can be used with a media card reader?
Digital Intelligence's UltraBlock USB Write Blocker ## Footnote This device is specifically designed for forensic investigations.
31
Name three types of additional storage media mentioned.
* Compact Disk (CD) * Digital Video Disc (DVD) * Magnetic Tape ## Footnote These storage media are used for data storage and transfer.
32
What is the significance of recognizing different types of computer hardware in forensics?
It is crucial for effectively extracting and analyzing data from various storage devices ## Footnote Understanding hardware helps investigators handle evidence properly.
33
What is the importance of disk drive interfaces in computer forensics?
They determine how an investigator can access and extract data from storage devices ## Footnote Different interfaces may require specific tools and methods.
34
Fill in the blank: The summary of Chapter 3 reviewed the importance of recognizing different types of _______.
computer hardware
35
What types of devices are used to forensically extract data?
Various tools and hardware designed for data acquisition ## Footnote This includes card readers, write-blockers, and forensic software.
36
True or False: A floppy disk is considered a modern storage medium.
False ## Footnote Floppy disks are outdated and not commonly used in contemporary data storage.
37
What is one key takeaway from Chapter 3 regarding evidence handling?
How storage media should be handled and analyzed ## Footnote Proper handling is essential for maintaining the integrity of forensic evidence.