IS4670 CHAPTER 1 System Forensics Fundamentals Flashcards

1
Q
1. To which domains of a typical IT infrastructure does system forensics apply?
A. User Domain 
B. Workstation Domain 
C. LAN Domain 
D. WAN Domain 
E. Remote Access Domain 
F. All of the above
A

All are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A computer can play one of three roles in a computer crime: It can be the target of the crime, it can be the instrument of the crime, or it can serve as an evidence repository that stores valuable information about the crime.
    A. True
    B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. When people try to destroy incriminating evidence contained on a computer, they leave behind vital ________ .
A

Clues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. System forensics is the same as data recovery.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
5. A system forensics professional should be able to successfully perform complex evidence recovery procedures. Which of the following tasks should such a specialist be able to perform? (Select three.)
A. Expert witness services 
B. Data recovery 
C. Data dump 
D. Document searches
A

Expert witness services

Data recovery

Document searches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following is not an important characteristic of a forensic specialist?
    A. A sound knowledge of computing
    B. Careful methodology of approach
    C. Law degree
    D. Access to and skill in the use of appropriate utilities
A

Law degree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
7. Which of the following refers to anything that changes or destroys digital evidence between the time the evidence is created and when the case goes to court?
A. Disk forensics 
B. Evidence dynamics 
C. Spoliation 
D. Live system forensics
A

Evidence dynamics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following is not a broad test that should be applied to forensic evidence?
    A. Fairness
    B. Authenticity
    C. Reliability
    D. Completeness
    E. Freedom from interference and contamination
A

Fairness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. The system forensics specialty that involves acquiring and analyzing data stored on physical storage media, such as computer hard drives and removable media is called ________.
A

Disk forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. ________ is an area of system forensics that is used to search memory in real time, typically for working with compromised hosts or to identify system abuse.
A

Live system forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. ________ is an area of system forensics that is most often used to examine malicious code.
A

Software forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly