Module 3 Quiz Flashcards
Which forensics tools can connect to a suspect’s remote computer and run surreptitiously?
ddfldd and ProDiscover Incident Response
EnCase Enterprise and ProDiscover Incident Response
dd and ddfldd
dd and EnCase Enterprise
EnCase Enterprise and ProDiscover Incident Response
What does a sparse acquisition collect for an investigation?
Only specific files of interest to the case
Fragments of unallocated data in addition to the logical allocated data
Only the logical allocated data
Only fragments of unallocated data
Fragments of unallocated data in addition to the logical allocated data
Why is it a good practice to make two images of a suspect drive in a critical investigation?
To speed up the process
To have one compressed and one uncompressed copy
To ensure at least one good copy of the forensically collected data in case of any failures
None of the above
To ensure at least one good copy of the forensically collected data in case of any failures
Slower data transfer speeds and dealing with minor data errors are two disadvantages of the raw format
True
False
False
In Linux, the fdisk -l command lists the suspect drive as /dev/hda1. So, the following dcfldd is command correct. dcfldd if=image_file.img of=/dev/hda1
True
False
False
What’s the maximum file size when writing data to a FAT32 drive?
2 GB
3 GB
4 GB
6 GB
2 GB
What are two concerns when acquiring data from a RAID server?
Data transfer speeds and type of RAID
Type of RAID and antivirus software
Amount of data storage needed and type of RAID
Split RAID and Redundant RAID
Amount of data storage needed and type of RAID
With remote acquisitions, what problems should you be aware of?
Data transfer speeds
Access permissions over the network
Antivirus, antispyware, and firewall programs
The password of the remote computer’s user
Antivirus, antispyware, and firewall programs
What’s the most critical aspect of digital evidence?
Compression
Redundancy
Contingency
Validation
Validation
A logical acquisition collects only specific files of interest to the case.
True
False
True
FTK Imager requires that you use a device such as a USB dongle for licensing.
True
False
True
With newer Linux kernel distributions, USB devices are automatically mounted, which can alter data on it.
True
False
True
Name two commercial tools that can make a forensic sector-by-sector copy of a drive to a larger drive.
dd and Expert Witness
dd and EnCase
X-Ways Forensics and dd
EnCase and X-Ways Forensics
EnCase and X-Ways Forensics
FTK Imager can acquire data in a drive’s host protected area.
True
False
False
Of all the proprietary formats, which one is the unofficial standard?
Expert Witness
AFF
Uncompress dd
Segmented dd
Expert Witness