final Flashcards
chapter 6,8,9,10,12,13 review questions
What are the functions required for digital forensics tools?
Acquisition, validation and verification, extraction, reconstruction, and reporting
acquisition
the process of creating a duplicate image of data; one of the required functions of digital tools
brute-force attack
the process of trying every combination of characters to find a matching password or passphrase value for an encrypted file
Computer Forensics Tool Testing (CFTT)
a project sponsored by the National Institute of Standards and Technology (NIST) to manage research on digital forensics tools
extraction
the process of pulling relevant data from an image and recovering or reconstructing data fragments; one of the required functions of digital forensics tools
keyword search
a method of finding files or other information by entering relevant characters, words, or phrases in a search tool
National Software Reference Library (NSRL)
a NIST project with the goal of collecting all known hash values for commercial software and OS files
password dictionary attack
an attack that uses a collection of words or phrases that might be passwords for an encrypted file. password recovery programs can use this to compare potential passwords to an encrypted file’s password or passphrase hash values
validation
a way to confirm that a tool is functioning as intended; one of the functions of digital forensics tools
reconstruction
the process of rebuilding data files; one of the required functions of digital forensics tools
verification
the process of proving that two sets of data are identical by calculating hash values or using another similar method
write-blocker
a hardware device or software program that prevents a computer from writing data to an evidence drive. software write-blockers typically alter interrupt-13 write functions to a drive in a PC’s BIOS. hardware write-blockers are usually bridging devices between a drive and and the forensic workstation
Forensics software tools are grouped into ____ and ___ applications.
command-line and GUI
According to ISO standard 27037, which of the following is an important factor in data acquisition?
Digital Evidence First Responder (DEFR)’s competency and use of validated tools
An encrypted drive is one reason to choose a logical acquisition. True or False?
True
Hashing, filtering, and file header analysis make up which function of digital forensics tools?
Validation and verification
Hardware acquisition tools typically have built-in software for data analysis. True or False?
False
The reconstruction function is needed for which of the following purposes?
recreate a suspect drive to show what happened, create a copy of drive for other investigators, recreate a drive compromised by malwares
List three subfunctions of the extraction function.
data viewing, keyword searching, decompressing/uncompressing, carving, decrypting, book marking/tagging
Hash values are used for which of the following purposes?
filtering known good files from potentially suspicious data,
reconstructing file fragments, validating that the original data hasn’t changed
In testing tools, the term “reproducible results” means that if you work in the same lab on the same machine, you generate the same results. True or false?
False
The verification function does which of the following?
Proves that two sets of data are identical hash values
What’s the advantage of a write-blocking device that connects to a computer through a FireWire or USB controller?
Not having to shut down your workstation when drives are disconnected
Building a forensic workstation is more expensive than purchasing one. True or False?
True
A live acquisition can be replicated. True or false?
False
Which of the following is true about most drive-imaging tools?
They ensure that the original drive doesn’t become corrupt and damage the digital evidence, they create a copy of the original drive
The standards for testing forensics tools are based on which criteria?
ISO 17025
A log report in forensics tools does which of the following?
Records an investigator’s actions in examining a case
When validating the results of a forensic analysis, you should do which of the following?
Calculate the hash value with two different tools
The primary hashing algorithm the NSRL uses is SHA-1. True or False?
True
bitmap images
collections of dots, or pixels, in a grid format that forms a graphic
carving
the process of recovering file fragments that are scattered across a disk
data compression
the process of coding data from a larger form to a smaller form
demosaicing
the process of converting raw picture data to another format, such as JPEG or TIF
Exchangeable Image File (Exif)
a file format the Japan Electronics and Information Technology Industries Association (JEITA) developed as a standard for storing metadata in JPEG and TIF files
fair use
a guideline that describes the free use of copyrighted material for news reports, critiques, noncommercial use, and educational purposes
false positives
the result of keyword searches that contain the correct match but aren’t relevant to the investigation
least significant bit (LSB)
the lowest bit value in a byte. in Microsoft OSs, bits are displayed from right to left, so the rightmost bit is the LSB
lossless compression
a compression method in which no data is lost. with this type of compression, a large file can be compressed to take up less space and then uncompressed without any loss of information
lossy compression
a compression method that permanently discards bits of information in a file. the removed bits of information reduce image quality
metafile graphics
graphics files that are combinations of bitmap and vector images
most significant bit (MSB)
the highest bit value in a byte
nonstandard graphics file formats
less common graphics file formats, including proprietary formats, newer formats, formats that most image viewers don’t recognize, and old or obsolete formats
pixels
small dots used to create images; the term comes from “picture element”
raster images
collections of pixels stored in rows rather than a grid, as with bitmap images, to make graphics easier to print; usually created when a vector graphic is converted to a bitmap image
raw file format
a file format typically found on higher-end digital cameras; the camera performs no enhancement processing—hence the term “raw.” this format maintains the best picture quality, but because it’s a proprietary format, not all image viewers can display it
resolution
the density of pixels displayed onscreen, which governs image quality
salvaging
another term for carving
standard graphics file formats
common graphics file formats that most graphics programs and image viewers can open
vector graphics
graphics based on mathematical instructions to form lines, curves, text, and other geometric shapes
vector quantization (VQ)
a form of compression that uses an algorithm similar to rounding off decimal values to eliminate unnecessary bits of data
Graphics files stored on a computer can’t be recovered after they are deleted. True or False?
False
When you carve a graphics file, recovering the image depends on which of the following skills?
Recognizing the pattern of the file header content
Explain how to identify an unknown graphics file format that your digital forensics tool doesn’t recognize.
Find the hexadecimal for the first several bytes of the file from a hex editor. Compare other file formats with similar hex code in their headers
What type of compression uses an algorithm that allows viewing the graphics file without losing any portion of the data?
lossless
When investigating graphics files, you should convert them into one standard format. True or False?
False
Digital pictures use data compression to accomplish which of the following goals?
Save space on hard drive, provide a crisp and clear image, eliminate redundant data
The process of converting raw images to another format is called which of the following?
Demosaicing
In JPEG files, what’s the starting offset position for the JFIF label?
Offset 6
Each type of graphics file has a unique header containing information that distinguishes it from other types of graphics files. True or False?
True
Copyright laws don’t apply to Web sites. True or False?
False
When viewing a file header, you need to include hexadecimal information to view the image. True or False?
True
When recovering a file with ProDiscover, your first objective is to recover cluster values. True or False?
True
Bitmap (.bmp) files use which of the following types of compression?
Lossless
A JPEG file uses which type of compression?
Lossy
Only one file format can compress graphics files. True or False?
False
A JPEG file is an example of a vector graphic. True or False?
False
Which of the following is true about JPEG and TIF files?
They have different values for the first 2 bytes of their file headers
What methods do steganography programs use to hide data in graphics files?
Carving
Some clues left on a drive that might indicate steganography include which of the following?
Multiple copies of a graphics file, graphics files with the same name but different file sizes, steganography programs in the suspect’s All Programs list, graphics files with different timestamps
What methods are used for digital watermarking?
Invisible modification of the LSBs in the file, layering visible symbols on top of the image, using a hex editor to alter the image data
bit-shifting
the process of shifting one or more digits in a binary number to the left or right to produce a different value
block-wise hashing
the process of hashing all sectors of a file and then comparing them with sectors on a suspect’s drive to determine whether there are any remnants of the original file that couldn’t be recovered
cover-media
in steganalysis, the original file with no hidden message
key escrow
a technology designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure