IS4670 CHAPTER 1 System Forensics Fundamentals Flashcards
1
Q
1. To which domains of a typical IT infrastructure does system forensics apply? A. User Domain B. Workstation Domain C. LAN Domain D. WAN Domain E. Remote Access Domain F. All of the above
A
All are correct
2
Q
- A computer can play one of three roles in a computer crime: It can be the target of the crime, it can be the instrument of the crime, or it can serve as an evidence repository that stores valuable information about the crime.
A. True
B. False
A
True
3
Q
- When people try to destroy incriminating evidence contained on a computer, they leave behind vital ________ .
A
Clues
4
Q
- System forensics is the same as data recovery.
A. True
B. False
A
False
5
Q
5. A system forensics professional should be able to successfully perform complex evidence recovery procedures. Which of the following tasks should such a specialist be able to perform? (Select three.) A. Expert witness services B. Data recovery C. Data dump D. Document searches
A
Expert witness services
Data recovery
Document searches
6
Q
- Which of the following is not an important characteristic of a forensic specialist?
A. A sound knowledge of computing
B. Careful methodology of approach
C. Law degree
D. Access to and skill in the use of appropriate utilities
A
Law degree
7
Q
7. Which of the following refers to anything that changes or destroys digital evidence between the time the evidence is created and when the case goes to court? A. Disk forensics B. Evidence dynamics C. Spoliation D. Live system forensics
A
Evidence dynamics
8
Q
- Which of the following is not a broad test that should be applied to forensic evidence?
A. Fairness
B. Authenticity
C. Reliability
D. Completeness
E. Freedom from interference and contamination
A
Fairness
9
Q
- The system forensics specialty that involves acquiring and analyzing data stored on physical storage media, such as computer hard drives and removable media is called ________.
A
Disk forensics
10
Q
- ________ is an area of system forensics that is used to search memory in real time, typically for working with compromised hosts or to identify system abuse.
A
Live system forensics
11
Q
- ________ is an area of system forensics that is most often used to examine malicious code.
A
Software forensics