Chapter 4 Flashcards

1
Q

What is the first step in examining a suspect machine according to the text?

A

Check for running processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What command is used to show network statistics and any current connections?

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is the net sessions command different from the netstat command?

A

Net sessions shows only established network communication sessions while netstat shows all connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two free tools mentioned in the text that can capture memory?

A

Magnet RAM Capture and DumpIt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should be done before shutting down a suspect system?

A

Run certain commands and photograph the results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is it important to record BIOS information before dismantling a computer for forensic examination

A

To document the system’s hardware configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What hashing algorithm is most commonly used according to the text?

A

SHA1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a swap file?

A

To optimize the use of random access memory (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the order of data collection in digital forensics?

A

Collect volatile data, then temporary data, then persistent data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is steganized information?

A

Information concealed within other files or buried inside the 1s and 0s of a picture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three techniques of forensic analysis?

A

Live analysis, physical analysis, logical analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of swap files?

A

They work on a queue system and store data that was live in memory and not stored on the suspect drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a swap file?

A

A virtual memory extension of RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the TLN format stand for in a timeline?

A

Time, Source, System, User, Description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Master Boot Record (MBR) in the context of digital forensics?

A

A single sector leaving 62 empty sectors for hiding data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Host Protected Area (HPA) in the context of digital forensics?

A

An area where computer vendors store data

17
Q

What is the Digital Audio Tape (DAT) drive?

A

A type of tape drive that uses 4-mm magnetic tape enclosed in a protective plastic shell.

18
Q

What is the Advanced Forensic Format (AFF)?

A

An open file standard with three variations: AFF, AFM, and AFD.

19
Q

What does the Linux dd command do in the context provided?

A

It overwrites everything on the target drive with null values