Final Exam 3 Flashcards

1
Q

MAC and OXS is built on what OP?

A

Unix Darwin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Junk files:

A

Junk files are temporary files created by window during the execution of a task, but not deleted after the task has been performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prefect files:

A

Are artifacts for forensics investigation. For example, prefect files are created in window for example when an application is run from a particular location for the very first time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Right of ownership in criminal case is a warrant and a subpoena in civil case

A

in criminal case is a warrant and a subpoena in civil case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Every email contains a header.

A

The transport header is read bottom up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Investigation Technique

A
preparation 
survey
preservation
Examination
Presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Modus Operandi

A

refers to the behaviors that are engaged in by a criminal for the purpose of successfully completing an offense. A criminal’s MO reflects how he/she committed his/her crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Modus Operandi-

A

Oriented behaviors are behaviors that were necessary to commit the crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

motive- or signature-oriented

A

behavior are behaviors that were not necessary to commit the crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Right of ownership in civil case

A

is when a permission is given by owner to access evidence if not, a subpoena is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Right of ownership in criminal
A

is dictated by a warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where to find USB insert for MAC :

A

In the sidebar Plist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Taking Physical image of an encrypted disk while system is running.

A

It would lead to getting encrypted image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Email protocol

A

is a method by which tow computers communicate and exchange an email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mail server :

A

Stores the mail and let the receiving device access it and download when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mail Protocol:

A

POP 3, IMAP, SMTP for devices interconnected, HTTP for internet browser

17
Q

When investigation event log:

A

Do not rely on dates, look for log entries

18
Q

Windows Artifacts:

A

Windows file systems, registry, shortcut files, hibernation files, prefetch files, event logs, internet history Windows executable, metadata, recycle bin, drop box, print spooling, thumbnail images, and lists of recently used applications.

19
Q

Greatest challenge to digital forensics:

A

Encryption, cloud storage nature of acquisition, Hacking, network interface.

20
Q

SS7:

A

Signal that carrier use to pass voice from tower to tower. Can be used to eardrop communication.

21
Q

Biggest challenge to phone:

A

It’s encryption

22
Q

Fsventer:

A

Tracks the file system ‘s activities in Mac

23
Q
  1. Mac artifacts :
A

History (Web, bookmarks, downloads and search terms)
Cookies
Web Logins
Archived History (Web History and search terms)
Bookmarks (This is in a non-SQLite format)

24
Q
  1. Each apple device has unique UID
A

Each apple device has unique UID

25
Q

spot light index

A

index everything that is on the computer

26
Q

Where are metadata for files on FAT system stored

A

On Fat Directory entries and in the allocation table.