Chapter 4 Flashcards

1
Q

What is required for evidence to be admissible in court?

A

Evidence must be obtained legally with a search warrant or consent

This includes proper documentation like the chain of custody form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What organization sets standards and guidelines for forensic labs?

A

American Society of Crime Laboratory Directors (ASCLD)

ASCLD is a non-profit organization that promotes ethical practices in forensic labs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does ASCLD/LAB do?

A

Certifies labs, including computer forensics labs, for federal, state, and local agencies

ASCLD/LAB strives to maintain certain standards for forensics labs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What international standard is relevant for digital forensic laboratories?

A

ISO/IEC 17025:2017

This standard provides guidelines for the competence of testing and calibration laboratories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is eDiscovery?

A

The detection of electronic data for litigation purposes

Involves retrieving electronically stored information (ESI) such as emails and spreadsheets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of an evidence acquisition laboratory?

A

To extract evidence from storage devices for forensic analysis

Staff must be skilled in imaging software like FTK and EnCase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a write-blocker?

A

A hardware device that allows reading data from a device without writing to it

Essential for preventing data alteration during forensic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of a Laboratory Information Management System (LIMS)?

A

Software for managing samples, data, and workflows in a lab

Offers case management, evidence tracking, and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of the Faraday Room in a forensic lab?

A

Blocks network connections to preserve evidence integrity

Prevents remote wipe and ensures evidence remains unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the default file system for modern Linux systems?

A

EXT4

EXT4 offers improved performance and reliability over its predecessors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of the dd command in Linux?

A

To create an image of a partition

It copies and converts files in Unix operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Mobile device encryption has led to less invasive techniques in forensics.

A

False

It has led to more invasive techniques like chip-off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some benefits of web hosting services provided by computer forensics departments?

A
  • Centralized storage
  • Efficient access
  • Streamlined discovery
  • Audit trails

These benefits enhance evidence management during investigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: The _______ is a command-line utility used for reporting and manipulating a disk partition table.

A

fdisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does LiME stand for?

A

Linux Memory Extractor

It is an open-source tool for memory acquisition in Linux systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary concern for investigators when dealing with mobile devices?

A

Preventing remote wipe of the device

This is critical for maintaining evidence integrity.

17
Q

What does the term ‘chain of custody’ refer to?

A

The process of maintaining and documenting the handling of evidence

It ensures the integrity of the evidence collected.

18
Q

What is the significance of the Scientific Working Group on Digital Evidence (SWGDE)?

A

Shares research and sets standards for digital evidence investigations

Provides best practices for computer forensics examinations.

19
Q

What are some examples of Linux distributions suitable for digital forensic analysis?

A
  • Ubuntu
  • Debian
  • Kali Linux

Each distribution serves specific tasks within IT and forensic analysis.

20
Q

What is the purpose of password-cracking software in a forensic lab?

A

To gain access to encrypted files and drives

This is essential for analyzing secure data during investigations.

21
Q

What is necessary for a computer forensics laboratory to be certified?

A

Understanding of certification requirements

Certification involves meeting specific standards and practices in the field of computer forensics.

22
Q

What are good practices for managing and processing evidence in a computer forensics laboratory?

A

Following established protocols and maintaining chain of custody

Good practices ensure the integrity and reliability of the evidence.

23
Q

How should a computer forensics laboratory be structured?

A

With designated areas for evidence handling, analysis, and storage

Proper structure helps in maintaining organization and security.

24
Q

What are the hardware and software requirements for a computer forensics laboratory?

A

Specialized forensic tools, secure storage solutions, and sufficient processing power

These requirements support effective evidence analysis and management.

25
What are proper ways to acquire, handle, and analyze digital evidence?
Using forensic imaging, maintaining integrity, and following analytical protocols ## Footnote Proper methods ensure that the evidence remains admissible in court.
26
What methods are reviewed for investigating financial fraud?
Analyzing transaction records, tracing funds, and examining digital footprints ## Footnote These methods help uncover fraudulent activities and gather evidence.
27
How can UNIX commands be used in computer forensics?
To search files for particular information of interest ## Footnote UNIX commands provide powerful tools for file manipulation and data retrieval.
28
Fill in the blank: A computer forensics laboratory should be structured with designated areas for evidence _______.
handling, analysis, and storage ## Footnote This structure is crucial for maintaining organization and security.
29
True or False: Certification of a computer forensics laboratory is optional.
False ## Footnote Certification is often required to ensure adherence to standards.