IS4670 Chapter 6 Controlling a Forensic Investigation Flashcards
1
Q
1. What type of data is lost whenever a system is used and should therefore be collected first to minimize corruption or loss? A. Bit stream data B. Forensic data C. Temporary data D. Volatile data
A
Volatile data
2
Q
- The ________, as its name suggests, recommends leaving a suspect computer turned on and working on it immediately after securing it.
A
Live analysis school of thought
3
Q
- Why is it important to create a bit stream copy of a disk drive or another type of storage media?
A. A bit stream copy can be created very quickly.
B. A bit stream copy exactly replicates all sectors on the storage device, including all files and ambient data storage areas.
C. The Department of Defense requires bit
stream copies in all investigations.
D. It’s not. Standard file backups and network server backups are sufficient in most cases.
A
A bit stream copy exactly replicates all sectors on the storage device, including all files and ambient data storage areas.
4
Q
- You should always work on the suspect hard drive rather than a backup, a duplicate, a copy, or an image.
A. True
B. False
A
FALSE
5
Q
- In a forensic investigation, speed is more important than thoroughness.
A. True
B. False
A
FALSE
6
Q
6. Which of the following is a batch file that handles drivers for all the devices hooked up to the controllers and ports? A. AUTOEXEC.BAT B. COMMAND.COM C. CONFIG.SYS D. DRVSPACE.BI
A
AUTOEXEC.BAT
7
Q
7. Which techniques of forensic analysis are discussed in this chapter? (Select three.) A. Live analysis B. Volatile analysis C. Physical analysis D. Logical analysis
A
Live analysis
Physical analysis
Logical analysis
8
Q
8. Which of the following does Windows use on a system as a “scratch pad” to write data when additional RAM is needed? A. Batch file B. Swap file C. File residue D. Unallocated space
A
Swap file
9
Q
9. Which of the following is the smallest unit of storage on a computer? A. File allocation table (FAT) B. Cluster C. Sector D. File
A
Sector
10
Q
- ________ is the area of a hard drive that has never been allocated for file storage, or the leftover area that the computer regards as unallocated after file deletion.
A
Unallocated space
11
Q
- One of the first questions that can be asked in computer seizure law is when exactly the search occurs. The ________ Amendment to the U.S. Constitution deals with search and seizure.
A
Fourth
12
Q
- Which of the following is not a best practice in preserving data for future computer forensics examination?
A. Immediately turn on and attempt to examine the suspect computer.
B. Identify all devices that may contain evidence.
C. Quarantine all in-house computers.
D. Forensically image all suspect media.
A
Immediately turn on and attempt to examine the suspect computer.