IS4670 Chapter 5 System Forensics Technologies Flashcards

1
Q
  1. The ________ is the department of the U.S. federal government that coordinates and super- vises agencies and functions of the government related to national security and the U.S. armed forces.
A

Department of Defense (DoD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. What is the name of the organization that is involved with DoD investigations that require computer forensics support to detect, enhance, or recover digital media?
A. U.S. Army 
B. U.S. law enforcement 
C. DoD Digital Media Center (DDMC) 
D. DoD Cyber Crime Center (DC3)
A

DoD Cyber Crime Center (DC3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Law enforcement agencies do not have to be as careful as corporations about preserving evidence.
    A. True
    B. False
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. It is almost impossible to use forensic technologies to find evidence on flash memory media.
    A. True
    B. False
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
5. Which of the following is the process of encoding information using fewer bits than the unencoded information would use?
A. Compression 
B. Encryption 
C. Decryption 
D. Jailbreaking
A

Compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A ________ is a tool used to identify unknown strings of text by searching for values between “completely true” and “completely false.”
A

Fuzzy logic tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
7. Which of the following is the name for the process of making data unreadable to anyone except those who have the correct key?
A. Compression 
B. Encryption 
C. Decryption 
D. Jailbreaking
A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8. Port numbers are divided into three ranges. Which of the following is not one of the ranges?
A. Well-known ports 
B. Open ports 
C. Registered ports 
D. Dynamic ports
A

Open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9. Which of the following is a good forensic analysis tool for those who are just starting to learn about forensics or do not have the time to invest in many different expensive tools?
A. EnCase 
B. FTK 
C. AnaDisk 
D. TextSearch Plus 
E. Filter_G
A

FTK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. ________ is a commercial software package that has the ability to make bit-level images and then mount them for analysis.
A

EnCase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
11. Which of the following commonly used system forensics tools is utilized primarily to scan for anomalies that identify odd formats, extra tracks, and extra sectors?
A. EnCase 
B. FTK 
C. AnaDisk 
D. CopyQM Plus 
E. Filter_G
A

AnaDisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
12. Which of the following commonly used system forensics tools can quickly search hard disk drives, zip disks, and CDs for keywords or specific patterns of text?
A. AnaDisk 
B. CopyQM Plus 
C. TextSearch Plus 
D. Filter_G
A

TextSearch Plus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
13. Which of the following commonly used system forensics tools is a fuzzy logic tool employed for data sampling?
A. AnaDisk 
B. CopyQM Plus 
C. TextSearch Plus 
D. Filter_G
A

Filter_G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
14. Which of the following forensic tools is a stand- alone device capable of acquiring data from mobile devices?
A. UFED 
B. Device Seizure 
C. The Zdziarski technique 
D. EnCase
A

UFED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
15. Unlike jailbreaking, which of the following does not install any additional software or modify the user data partition in any way?
A. UFED 
B. Device Seizure 
C. The Zdziarski technique 
D. EnCase
A

The Zdziarski technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly