Digital Forensic Investigations Flashcards
Cryptography is about obfuscating a message so that it cannot be read.
True
Social Engineering has the same goals and objectives as other types of hacking.
True
When investigating a media leak, you need to obtain a list of keywords related to the media leak.
True
When planning a digital forensic investigation, you must do which of the following:
*Prepare a forensic workstation
* Make a forensically sound copy of the evidence drive
* Use antistatic bags
The role of computer forensic professional is to gather evidence to prove that a suspect committed a crime or violate a company policy.
True
What are three main types of metadata?
*Descriptive
*Administrative
*Structural
FAT File System stands for ____.
File Allocation Table
When setting up a forensic lab, the tools, software, and equipment needed will vary depending on the types of cases and computer systems that you are faced with.
True
The Microsoft Windows OS uses two major file systems: FAT and NTFS.
True
Reconstructing the crime scene, even from a digital aspect, is a scientific process.
True
A cache file remains available on the computer even when the browser is closed or the computer is shut down.
True
HTML operates on what port number?
80
Computers can contain information that helps law enforcement determine the following:
1. Chain of events leading to a crime
2. Evidence that can lead to a conviction
True