Digital Forensics Flashcards

1
Q

Volatile information locations such as the RAM change constantly and data collection should occur in the order of volatility or lifetime of the data. Order the following list from most volatile (which should be collected first) to least volatile.

Routing tables, ARP cache, process tables, kernel statistics

Memory (RAM)

CPU, cache, and register contents

Temporary file system/swap space

A

CPU, cache, and register contents

Routing tables, ARP cache, process tables, kernel statistics

Memory (RAM)

Temporary file system/swap space

The most volatile elements should be examined and collected first and in this order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A common data element needed later in the forensics process is an accurate system time with respect to an accurate external time source. A record time offset is calculated by measuring system time with an external clock such as a Network Time Protocol (NTP) server. Which of the following must be considered relative to obtaining a record time offset?

The record time offset can be lost if the system is powered down, so it is best collected while the system is still running.

The internal clock may not be recorded to the same level of accuracy, so conversions may be necessary.

External clock times may vary as much as 2 to 3 seconds, so it is best to obtain the time from several NTP servers to gain a more accurate reading.

A

The record time offset can be lost if the system is powered down, so it is best collected while the system is still running.

Record time offset will be lost if the system is powered down, so it is best collected while the system is still running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the term used to describe the process that accounts for all persons who handled or had access to a piece of evidence?

Secure e-discovery

Chain of custody

Evidence accountability process

A

Chain of custody

The chain of custody accounts for all persons who handled or had access to the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the U.S. legal system, at what point does legal precedent require that potentially relevant information must be preserved?

When the owner is provided with a warrant to seize the storage device

At the instant a party “reasonably anticipates” litigation or another type of formal dispute

The moment any investigation is begun

A

At the instant a party “reasonably anticipates” litigation or another type of formal dispute

In the U.S. legal system, legal precedent requires that potentially relevant information must be preserved at the instant a party “reasonably anticipates” litigation or another type of formal dispute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which standard of evidence states the evidence must be convincing or measure up without question?

Direct evidence

Relevant evidence

Sufficient evidence

A

Sufficient evidence

Sufficient evidence states the evidence must be convincing or measure up without question. Direct evidence is oral testimony that proves a specific fact (such as an eyewitness’s statement). The knowledge of the facts is obtained through the five senses of the witness, with no inferences or presumptions. Competent evidence states the evidence must be legally qualified and reliable. Relevant evidence states the evidence must be material to the case or have a bearing on the matter at hand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which standard of evidence states the evidence must be material to the case or have a bearing on the matter at hand?

Direct evidence

Competent evidence

Relevant evidence

A

Relevant evidence

Relevant evidence states the evidence must be material to the case or have a bearing on the matter at hand. Sufficient evidence states the evidence must be convincing or measure up without question. Direct evidence is oral testimony that proves a specific fact (such as an eyewitness’s statement). The knowledge of the facts is obtained through the five senses of the witness, with no inferences or presumptions. Competent evidence states the evidence must be legally qualified and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of evidence is oral testimony that proves a specific fact (such as an eyewitness’s statement), where the knowledge of the fact is obtained through the recollection of five senses of the witness, with no inferences or presumptions?

Direct evidence

Real evidence

Documentary evidence

A

Direct evidence

Direct evidence is oral testimony that proves a specific fact (such as an eyewitness’s statement). The knowledge of the facts is obtained through the five senses of the witness, with no inferences or presumptions. Real evidence is also known as associative or physical evidence and this includes tangible objects that prove or disprove a fact. Physical evidence links the suspect to the scene of a crime. Evidence in the form of business records, printouts, manuals, and similar objects, which make up much of the evidence relating to computer crimes, is documentary evidence. Demonstrative evidence is used to aid the jury and can be in the form of a model, experiment, chart, and so on, offered to prove that an event occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of evidence is also known as associative or physical evidence and includes tangible objects that prove or disprove a fact?

Direct evidence

Real evidence

Documentary evidence

A

Real evidence

Real evidence is also known as associative or physical evidence and includes tangible objects that prove or disprove a fact. Physical evidence links the suspect to the scene of a crime. Direct evidence is oral testimony that proves a specific fact (such as an eyewitness’s statement). The knowledge of the facts is obtained through the five senses of the witness, with no inferences or presumptions. Evidence in the form of business records, printouts, manuals, and similar objects, which make up much of the evidence relating to computer crimes, is documentary evidence. Demonstrative evidence is used to aid the jury and can be in the form of a model, experiment, chart, and so on, offered to prove that an event occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which rule states that evidence is not admissible if it was collected in violation of the Fourth Amendment’s prohibition of unreasonable search and seizure?

Best evidence rule

Hearsay rule

Exclusionary rule

A

Exclusionary rule

The Fourth Amendment to the U.S. Constitution precludes illegal search and seizure. Therefore, any evidence collected in violation of the Fourth Amendment is not admissible as evidence. This is addressed by the exclusionary rule. The best evidence rule addresses the fact that courts prefer original evidence rather than a copy, to ensure that no alteration of the evidence (whether intentional or unintentional) has occurred. Hearsay rule addesses second-hand evidence—evidence offered by the witness that is not based on the personal knowledge of the witness but is being offered to prove the truth of the matter asserted. There was no discussion of a direct evidence rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which rule of evidence addresses the fact that courts prefer original evidence rather than a copy, to ensure that no alteration of the evidence (whether intentional or unintentional) has occurred?

Best evidence rule

Hearsay rule

Exclusionary rule

A

Best evidence rule

The best evidence rule addresses the fact that courts prefer original evidence rather than a copy, to ensure that no alteration of the evidence (whether intentional or unintentional) has occurred. Hearsay rule addresses second-hand evidence—evidence offered by the witness that is not based on the personal knowledge of the witness but is being offered to prove the truth of the matter asserted. The Fourth Amendment to the U.S. Constitution precludes illegal search and seizure. Therefore, any evidence collected in violation of the Fourth Amendment is not admissible as evidence. This is addressed by the exclusionary rule. There was no discussion of a direct evidence rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following would a capture video not be used to collect?

Serial number plates

Cable connections

System image

A

System image

A system image is a dump of the physical memory of a computer system and would not be captured in a video. All of the others are static sources of information that a capture video is valuable in recording

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following performs a function similar to the familiar parity bits, checksum, or cyclic redundancy check?

Cryptographic algorithm

Authentication code

Hashing algorithm

A

Hashing algorithm

A hashing algorithm performs a function similar to the familiar parity bits, checksum, or cyclic redundancy check (CRC). It applies mathematical operations to a data stream (or file) to calculate some number that is unique based on the information contained in the data stream (or file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of plan is implemented when you have an idea of what information you will want to be able to examine and want to ensure the information is logged when it occurs, and if at all possible in a location that prevents alteration?

System logging plan

Forensic logging plan

Active logging plan

A

Active logging plan

When you have an idea of what information you will want to be able to examine, you can make an active logging plan that ensures the information is logged when it occurs, and if at all possible in a location that prevents alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

From the initial step in the forensics process, the most important issue must always be which of the following?

Preservation of the data

Chain of custody

Documenting all actions taken

A

Preservation of the data

While all of these are important, from the initial step in the forensics process, the most important issue must always be preservation of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly