IS4670 SLIDES STUDY GUIDE Flashcards

1
Q
  1. ____Mechanisms for Sensitive Data Exposure
A
➢	Hacking
➢	Man-in-the-Middle attack
➢	Keylogging software
➢	Social engineering
➢	Insider attack, physical computer, and     
           media theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. In Controls and Responses Network and computer security includes _____:
A

➢ Use defense in depth
➢ Use firewalls and intrusion detection or
prevention systems
➢ Monitor logs
➢ Harden the servers
➢ Install anti-malware software and keep it
up-to-date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The Role of Computers in Crimes is ____:
A
➢	Target
➢	Instrument
➢	Evidence
➢	Instrument > Evidence Repository
➢	Evidence Repository > Instrument
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. The Three A’s of Digital Forensics is ____:
A

➢ Acquire
➢ Authenticate
➢ Analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Law Firms need experienced forensics professionals to ___:
A

➢ Conduct investigations

➢ Testify as expert witnesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Criminal Prosecutors use digital evidence when working with ___:
A

➢ Incriminating documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Evidence Transport must include ____:
A

➢ Photograph or videotape the scene from premises to transport vehicle
➢ Photograph or videotape the scene from vehicle to lab
➢ Transport computer to a secure location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Photograph or videotape the scene from premises to transport vehicle, photograph or videotape the scene from vehicle to lab and Transport computer to a secure location are all a part of ____?
A

➢ Evidence Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. The Evidence Life Cycle include ____:
A

➢ Collect or seize evidence
➢ Transport evidence
➢ Protect or store evidence
➢ Analyze evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Collect or seize evidence, Transport evidence, Protect or store evidence, and Analyze evidence are all steps of the _____:
A

➢ Evidence Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Secure erasure or ____ completely overwrites sensitive data.
A

➢ Drive wiping or wiping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Secure erasures or wiping applies to:
A

➢ Slack space
➢ Unused sectors,
➢ Entire disk space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Why analyze data packets?
A

➢ Detect network problems, i.e.
bottlenecks
➢ Detect network intrusions
➢ Gather network statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What does a protocol analyzer do?
A

➢ Captures and decodes data packets
traveling on a network
➢ Allow you to read and analyze data
packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Binary Data often means picking apart binary formats such as ____?
A
➢	Windows 32-bit files
➢	DOS.com and .exe formats
➢	Linux Executable and Linking Format 
           (ELF) formats
➢	Uniplexed Information and Computing 
           System (UNIX) a.out format
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Windows 32-bit files, DOS.com and .exe formats, Linux Executable and Linking Format (ELF) formats, and Uniplexed Information and Computing System (UNIX) a.out format are all steps picking apart _____.
A

➢ binary formats

17
Q
  1. File Carving is best defined as _____?
A

➢ Reassembling files from fragments
➢ Generally “carve” out data between file
headers and footers

18
Q
  1. Popular tools of File Carving are _____?
A

➢ Foremost

➢ Scalpel

19
Q
  1. Reassembling files from fragments, and “carve” out data between file headers and footers are steps in _____?
A

➢ File Carving

20
Q
  1. Disk, Email, Network, Internet, Software, and Live system are types of _____?
A

➢ Forensic Investigations

21
Q
  1. Types of Investigations for the Forensic Professional include ___?
A
➢	Disk forensics
➢	Software forensics
➢	Network forensics
➢	Email forensics
➢	Live system forensics
➢	Internet forensics
22
Q
  1. The Investigative Process includes ___?
A

➢ Forensic Investigation which then leads

to Legal Proceedings

23
Q
  1. True or False – Obsession with law and judicial rules may inhibit an investigation.
A

➢ TRUE