Digital Forensics Flashcards

1
Q

The process of gathering and submitting computer evidence to trial and
interpreting that evidence by providing expert analysis

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Written procedures ensure that personnel handle forensics properly, effectively, and in
compliance with required regulations

A

Forensic Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ensure the scene is safe, secure the scene to prevent evidence
contamination, and identify the scope of evidence to be collected

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensure authorization to collect evidence is obtained, and then
document and prove the integrity of evidence as it is collected

A

Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Create a copy of evidence for analysis and use repeatable methods and
tools during analysis

A

Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Create a report of the methods and tools used in the investigation and
present detailed findings and conclusions based on the analysis

A

Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A process designed to preserve all relevant information when litigation is
reasonably expected to occur

A

Legal Hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contractual method of retaining (hiring) forensics investigators so that their analysis is
protected from disclosure by the work product doctrine

A

Work Product Retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The method and tools used to create a forensically sound copy of data from a
source device, such as system memory or a hard disk

A

Data Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A kit containing the software and hardware tools required to acquire and analyze
evidence from system memory dumps and mass storage file systems

A

Digital Forensics Kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A digital forensics case management product created by Guidance
Software with built-in pathways or workflow templates that show the
key steps in many types of investigations

A

EnCase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A digital forensics investigation suite by AccessData that runs on
Windows Server or server clusters for faster searching and analysis due
to data indexing when importing evidence

A

The Forensic Toolkit (FTK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An open-source digital forensics collection of command line tools and
programming libraries for disk imaging and file analysis that interfaces
with Autopsy as a graphical user front-end interface

A

The Sleuth Kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A process that creates an image file of the system memory that can be analyzed
to identify the processes that are running, the contents of temporary file systems,
Registry data, network connections, cryptographic keys, and more

A

System Memory Image Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Capturing the contents of memory while the computer is running using a
specialist hardware or software tool

A

Live Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The contents of memory are written to a dump file when Windows encounters an
unrecoverable kernel error

A

Crash Dump

17
Q

A file that is written to the disk when the workstation is put into a sleep state

A

Hibernation File

18
Q

A file that stores pages of memory in use that exceed the capacity of the host’s
physical RAM modules

A

Pagefile

19
Q

A process that creates an image file of the system’s disks that can be analyzed to
identify current, deleted, and hidden files on a given disk

A

Disk Image Acquisition

20
Q

Capturing the contents of the disk drive while the computer is still running

A

Live Acquisition

21
Q

The computer is shut down through the operating system properly and then the
disk is acquired

A

Static Acquisition by Shutting Down

22
Q

The system’s power is disconnected by removing the power plug from the wall
socket

A

Static Acquisition by Pulling the Plug

23
Q

Bit-by-bit copy of a disk that includes every non-bad sector on the
target disk including deleted or hidden data

A

Physical Acquisition

24
Q

Copies files and folders from partitions using the file system table
stored on the media

A

Logical Acquisition

25
Q

Forensic tool to prevent the capture or analysis device or workstation from
changing data on a target disk or media

A

Write Blockers

26
Q

A software utility that conducts the disk imaging of a target

A

Imaging Utilities

27
Q

A Unix/Linux/macOS command that can perform disk image acquisition

A

dd

28
Q

A function that converts an arbitrary length string input to a fixed length string
output

A

Hash

29
Q

A cryptographic hashing algorithm created to address possible weaknesses in the
older MD5 hashing algorithm
▪ SHA-1 uses a 160-bit hash digest, but isn’t considered strong
▪ SHA-2 uses a 256-bit or 512-bit hash digest and is the current version in
used in modern forensics

A

Secure Hash Algorithm (SHA)

30
Q

A cryptographic hashing algorithm created in 1990 with the most commonly used
variant being MD-5
▪ MD-5 uses a 128-bit hash digest, but is susceptible to collisions should
only be used as a second-factor of integrity checking

A

Message Digest Algorithm (MD5)

31
Q

A type of software that reviews system files to ensure that they have not been
tampered with

A

File Integrity Monitoring (FIM)

32
Q

A tool that shows the sequence of file system events within a source image in a
graphical format

A

Timeline

33
Q

HDDs and SSDs are divided into sectors of either 512 bytes (standard) or 4096 bytes
(advanced)

A

Carving

34
Q

The smallest unit the file system can address (default is 4096 bytes)

A

Block/Cluster

35
Q

A table that contains metadata with the location of each file in terms of
blocks/clusters for disks formatted as NTFS

A

Master File Table (MFT)

36
Q

The process of extracting data from a computer when that data has no associated
file system metadata

A

A table that contains metadata with the location of each file in terms of
blocks/clusters for disks formatted as NTFS

37
Q

An open-source command line tool that is part of The Sleuth Kit that is used to
conduct file carving on Linux and Windows systems

A

Scalpel

38
Q

The record of evidence history from collection, to presentation in court, to
disposal

A

Chain of Custody