Mid Term Flashcards

1
Q

True or False

Digital forensics and data recovery refer to the same activities

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Police in the united states must use the procedures that adhere to which of the following?

A

4th Amendment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List two types of digital investigations typically conducted in a business environment.

A

Fraud

Espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why should evidence media be write-protected?

A

You don’t the original data to be altered or corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data collected before an attorney issues a memo for an attorney-client privilege case is a protected under the confidential work product rule.

A

False - they need to have a warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An employer can be held liable for email harassment.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The manager of a digital forensics lab is responsible for which of the following?

A

Understand what the digital forensics lab is responsible for.
Insuring enough staff training for the employers so they know they’re doing the job.
Know the objective of the designated task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To maintain the chain of custody and prevent data from being lost, corrupted, or stolen is the reason why physical security is so critical for digital forensics labs.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A forensics workstation should always have a direct broadband connection to the internet.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What name refers to labs constructed to shield EMR emissions?

A

Tempest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the three formats for digital forensics data acquisitions.

A

Raw Format
Proprietary Formats
Advance Forensic Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a logical acquisition collect for an investigation?

A

Only specific files to interest to the case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is it good practice to make two images of a suspect drive in a critical investigation.

A

To ensure at least one good copy of the forensically collected data in case of any failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hashing algorithm?

A

A program designed to create a binary or hexadecimal number that represents the uniqueness of a data set, file, or entire disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the United States, if a company publishes a policy stating that it reserves the right to inspect computing assets at will, a corporate investigator can conduct covert surveillance on an employee with little cause.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

As a corporate investigator, you can become an agent of law enforcement when which of the following happens?

A

You begin to take orders from a police detective without a warrant or subpoena.
Your internal investigation has concluded, and you have filed a criminal complaint and turned over the evidence to law enforcement

17
Q

What are the three rules for a forensic hash?

A

t can’t be predicted
No two files can have the same hash value
If the file changes, the hash value changes.

18
Q

Which of the following techniques might be used in covert surveillance?

A

Keylogging

Data sniffing refer to review sheets.

19
Q

List two hashing algorithms commonly used for forensics purposes.

A

MD5 and SHA-1

20
Q

What does MFT stand for?

A

Master File Table

21
Q

Device drivers contain what kind of information?

A

Instructing the hardware on how to operate on that particular operating system.

22
Q

An image of a suspect drive can be loaded on a virtual machine?

A

True

23
Q

What happens when you copy an encrypted file from an EFS-enabled NTFS disk to a non-EFS disk or folder?

A

It will not be encrypted.

24
Q

Forensic software tools are grouped into _____ and _____ applications

A

command line

GUI

25
Q

Hash values are used for which of the following purposes?

A

Filtering

Validating

26
Q

The verification function does which of the following?

A

Proves that two sets of data are identical via hash values

27
Q

The log report in forensics tools does which of the following?

A

Records an investigator’s actions in examining a case

28
Q

Capitalization, or lack thereof, makes no difference with UNIX and Linux commands

A

False - Linux is case sensitive.

29
Q

What file under the /etc folder contains the hashed passwords for a local system?

A

Shadow

30
Q

_____ contain file and directory metadata and provide a mechanism for linking data stored in data blocks.

A

Inodes

31
Q

Where is the root user’s home directory located on a MAC OS X file system?

A

/private/var/root

32
Q

_____ is a specialized carving tool that can read many image file formats, such as RAW and Expert Witness.

A

Foremost

33
Q

How many bits are required to create a pixel capable of displaying 65,536 different colors.?

A

16

34
Q

What kind of graphics file combines bitmap and vector graphics types?

A

GIF, JPG, PNG

35
Q

The process of converting raw picture data to another format is called _____.

A

Demosaicing

36
Q

Referred to as a digital negative, the _____ is typically used on many higher end digital cameras.

A

raw file format