Digital Forensics/Cyber Security Flashcards

1
Q

Computer Forensics has been gaining in popularity as

A

society increasingly is dependent on technology. While is has been around for awhile, it is still seen as an emerging science.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Forensics uses specialized tools and techniques for

A

(like FTK toolkits) preserving, analyzing, recovering and authenticating electronic data such as files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MD5 while a valuable tool for digital forensics, is

A

is no longer uses today because of its vulnerabilities that hackers can exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MD5 stand for

A

Message Digest 5 and is a digital hash, that uses 128 bits displayed in Hex. and does a cyclical redundancy check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital evidence can be used for

A

hacking, narcotics trafficking, murder, data theft, and conspiracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital evidence can take the form of

A

hard drives, floppy, zip, jazz drives, CDs, DVDs, Blu Ray, tapes, memory cards, USB sticks, printers and fax machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two key responsibilities of a DFE

A

is to protect and authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital scientist can usually find

A

hidden files, deleted files, encrypted files and steganographic files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware is a catch all term to describe

A

malicious software threats and social engineering tools designed to vandalize or compromised computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware is used to

A

monitor a user’s activity without their knowledge and sends that information to someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojans are

A

hidden malware that is downloaded by a user unintentionally when they are trying to install a normal program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If you use encryption on a file, you can

A

generally prevent someone from trying to circumvent file and folder security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When someone eavesdrops on a network, they

A

have the ability to capture and reading data packets as they move across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A program virus is a

A

sequence of code that insert themselves into another executable program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network firewall filters packets to prevent unauthorized access by

A

direction, IP address and TCP or UDP port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

three properties secure information should have.

A

Confidentiality, Integrity and availability

17
Q

Footprinting is the

A

process of information gathering in which the attacker attempts to learn about the configuration and the networking and security systems.

18
Q

Authorization creates

A

one or more barriers around the resource such that only authenticated users can gain access.