Digital Forensics Flashcards
Which of the following is a unique challenge of cloud forensics that is not encountered in traditional forensic investigations?
A. Jurisdiction of storage
B. A lack of frameworks and specialist tools
C. A lack of data control
D. All of the above
D. All of the above
The information in a computer system’s event logs can yield valuable evidence because such logs record events and transactions that have occurred on the computer.
A. True
B. False
True
During the analysis phase in digital forensic investigations, the fraud examiner should look for exculpatory evidence but not inculpatory evidence.
A. True
B. False
False
Which of the following is TRUE regarding the types of information that digital forensic experts can typically recover from computer systems?
A. Digital forensic experts can recover time and date information about files, such as when they were created or modified
B. Digital forensic experts can recover information about websites that were visited on the computer system
C. Digital forensic experts can recover deleted emails, link files, and documents
D. All of the above
D. All of the above
When seizing a computer that is running, a fraud examiner should generally NOT search the computer for evidence because doing so might damage and taint relevant evidence.
A. True
B. False
True
If you are seizing a computer for forensic analysis, it is generally unnecessary to seize printers connected to it.
A. True
B. False
False
Which of the following is a matter that fraud examiners should consider when engaging in examinations involving computers?
A. Whether law enforcement should be notified
B. What to look for and where to look for it
C. Whether an outside digital forensic expert is needed
D all
D. All of the above
Forensic analysis should NOT be performed directly on suspect devices because doing so can alter or damage digital evidence.
A. True
B. False
True
Which of the following is the MOST ACCURATE statement about the types of information that digital forensic experts can typically recover from computer systems?
A. Hidden files can never be recovered.
B. Communications sent via instant message or email cannot be recovered.
C. Data that are corrupted cannot be uncorrupted.
D. Deleted files that have been overwritten generally cannot be recovered.
D. Deleted files that have been overwritten generally cannot be recovered.
When seizing a running computer for forensic examination, the seizing party should perform a graceful shutdown by turning off the computer using the normal shutdown process.
A. True
B. False
False
During the analysis phase in digital forensic investigations, it is BEST to use just one forensic tool for identifying, extracting, and collecting digital evidence.
A. True
B. False
False
When a digital forensic examiner is seizing a running computer for examination, they can retrieve data from the computer while the system is open and operating like normal if the evidence needed exists only in the form of volatile data.
A. True
B. False
True
When seizing a computer for examination, the seizing party should look around the area for passwords because many people leave passwords written down near their computers.
A. True
B. False
True
During the analysis phase in digital forensic investigations, the fraud examiner’s primary concern is to protect the collected information from seizure.
A. True
B. False
False
Even if files have been deleted from a target computer, it might be possible to recover those files.
A. True
B. False
True