Module 6 Quiz Flashcards

1
Q

Hash values are used for which of the following purposes?

Determining file size

Filling disk slack

Reconstructing file fragments

Validating that the original data hasn’t changed

A

Validating that the original data hasn’t changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The primary hashing algorithm the NSRL project uses is SHA-1.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Building a forensic workstation is more expensive than purchasing one.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The standards for testing forensics tools are based on which criteria?

U.S. Title 18

ASTD 1975

ISO 17025

All of the above

A

ISO 17025

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to ISO standard 27037, which of the following is an important factor in data acquisition?

The DEFR’s competency

The DEFR’s skills in using the command line

Conditions at the acquisition setting

None of the above

A

The DEFR’s competency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The reconstruction function is needed for which of the following purposes?

Re-create a suspect drive to show what happened.

Create a copy of a drive for other investigators.

Re-create a drive compromised by malware.

All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The verification function does which of the following?

Proves that a tool performs as intended

Creates segmented files

Proves that two sets of data are identical via hash values

Verifies hex editors

A

Proves that two sets of data are identical via hash values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Forensics software tools are grouped into ______ and ______ applications.

Portable, Desktop

Mobile, PC

Local, remote

GUI, command-line

A

GUI, command-line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data can’t be written to disk with a command-line tool.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is true of most drive-imaging tools?

They perform the same function as a backup.

They ensure that the original drive doesn’t become corrupt and damage the digital evidence.

They must be run from the command line.

All of the above

A

They ensure that the original drive doesn’t become corrupt and damage the digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Focus
A live acquisition can be replicated.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When using a write-blocking device you can’t remove and reconnect drives without having to shut down your workstation.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A log report in forensics tools does which of the following?

Tracks file types

Monitors network intrusion attempts

Records an investigator’s actions in examining a case

Lists known good files

A

Records an investigator’s actions in examining a case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data viewing, keyword searching, decompressing are three subfunctions of the extraction function.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When validating the results of a forensic analysis, you should do which of the following?

Calculate the hash value with two different tools.

Repeat the steps used to obtain the digital evidence, using the same tool, and recalculate the hash value to verify the results.

Use a command-line tool and then a GUI tool.

None of the above

A

Calculate the hash value with two different tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An encrypted drive is one reason to choose a logical acquisition.

True

False

A

True

17
Q

In testing tools, the term “reproducible results” means that if you work in the same lab on the same machine, you generate the same results.

True

False

A

False

18
Q

Hashing, filtering, and file header analysis make up which function of digital forensics tools?

Validation and verification

Acquisition

Extraction

Reconstruction

A

Validation and verification

19
Q

Hardware acquisition tools typically have built-in software for data analysis.

True

False

A

False