Chapter 6: Current Digital Forensics Tools Flashcards

1
Q

Encryption

A

The process of converting information or data into a code, especially to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

reconstruction

A

Re-create a suspect drive to show what happened during a crime or an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

acquisition

A

Making a copy of the original drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

brute-force attack

A

A trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer Forensics Tool Testing (CFTT)

A

Manages research on computer forensic tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

extraction keyword search

A

Text analysis technique that consists of automatically extracting the most important words and expressions in a text, speeds it up for investigators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

National Software Reference Library (NSRL) password dictionary attack

A

Brute-force hacking method used to break into a password-protected computer or server by systematically entering every word in a dictionary as a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reconstruction

A

Recreate a suspect drive to show what happened during a crime or incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

validation

A

An automatic computer check to ensure that the data entered is sensible and reasonable. It does not check the accuracy of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

write-blocker

A

Prevents data writes to a hard disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

carving

A

The identification and extraction of file types from unallocated clusters using file signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

purpose of the reconstruction function in a forensics investigation

A

To recreate image of a suspect drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BitLocker

A

Full volume encryption feature included with Microsoft Windows (Pro and Enterprise only) versions starting with Windows Vista.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the standard indicator for jpeg graphics files

A

FFD8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data copy sub-functions

A

Physical data copy, logical data copy, data acquisition format, command -line acquisition, GUI acquisition, remote, live, and memory acquisitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Acquisition Function

A

Making a copy of the original drive.

17
Q

Goal of NSRL project

A

To use RDS to locate and identify known bad files.

18
Q

Raw data format

A

A collection of unprocessed data. This means the file has not been altered, compressed, or manipulated in any way by the computer.

19
Q

Verification

A

Proves that two sets of data are identical by calculating hash values or using another similar method.