Final Flashcards

1
Q

prove user did what was accused

A

user path, link files, cross examination, windows password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

in encase, the search hit result and boomarks are stored in the evidence file: t/f

A

f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

explain locards principal

A

perp goes into crime scene they bring something in and leave it and grab something else when they leave (taking something from it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

list users created account the system: under users and screen cap

A

norm peterson + zerobit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

printed version of a document as well as a digital doc, what does two things the digital/ paper has over the other

A

digital: metadata, hex
paper: possible dna, original signature or any extraious notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

slackspace (end of file to the end of the cluster) the same as unallocated and how are they different

A

slackspace (end of file to the end of the cluster) the same as unallocated by having empty space at the end allocated space, different is marked for deletion, they are the same where data can be eventually be written to
unallocated is deleted files while slackspace is a gap of space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

explain how the file system in use on the computer is significant
what makes a search approach different between file systems

A

different hierarchy, and system structured different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are two sets of circumstances that result in temp files:

A

videos file, zoom files, word document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

email header: to from date return path, envelope to , devilery date, message Id, mime version, content type, xspam status and xspam level

explain each part

A

email header: to from date return path, envelope to(email user will never see) , devilery date, message Id(unique string to the message was created), mime version(internet standard which extends the format of email), content type(format of message html plain text, xspam status ( a spam score) and xspam level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

explain why a cookie can show a user has visited a specific site even if deleted

A

metadata from website it keeps track of, stored separately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the first sector of a partion is referred to as

A

master boot record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

example of compound file

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is smallest file size in encase can be save a file as the (e01)

A

1 megabyte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in extraction is there an sus of user trying to access a fake passport: t/f

A

t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

prove user look at image recently

A

link file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

owatt

A

is yes

17
Q

jolly is jpg?

A

ffd8 missing

18
Q

alfredo

A

no evidence of communication

19
Q

what is a wall file and what’s a journal file:

A

wal file is a write ahead log, information that gonna get stored within a database, journal file hold information that has been already committed to the database , temp holding stops for the db

20
Q

what is the first consideration when going to a scene

A

safety

21
Q

encase is best described as a :

A

a bit stream image of source device written to a file

22
Q

how does encase verify contents of data:

A

crc for every 64 sector

23
Q

sqlite database in hex viewer how may bites consist of header:
bites 16 and 17 tell us what:
at offset 28 for 4 bites give you
multiply total x pages size is

A

16 bytes
page size
total number of pages
number of bytes

24
Q

how does ensace source device:

A

md5 of source and copy by comparing the md of source and md of copy of edivce file

25
Q

for a encase file to pass the verification process

A

both crc + md5

26
Q

md5 hash algorithm is ____ in length

A

128

27
Q

will encase allow user to write in file: t/f

A

f

28
Q

when’s non compressed file is .and telling it to make new copy compressed is it the same?: t/f

A

t

29
Q

what happens when encase tries to open evidence file that has been moved?:

A

encase prompts for the location of the file

30
Q

during reaqiscition you may change on of the following?:

A

file segment size