Module 6 Quiz Flashcards
Hash values are used for which of the following purposes?
Determining file size
Filling disk slack
Reconstructing file fragments
Validating that the original data hasn’t changed
Validating that the original data hasn’t changed
The primary hashing algorithm the NSRL project uses is SHA-1.
True
False
True
Building a forensic workstation is more expensive than purchasing one.
True
False
False
The standards for testing forensics tools are based on which criteria?
U.S. Title 18
ASTD 1975
ISO 17025
All of the above
ISO 17025
According to ISO standard 27037, which of the following is an important factor in data acquisition?
The DEFR’s competency
The DEFR’s skills in using the command line
Conditions at the acquisition setting
None of the above
The DEFR’s competency
The reconstruction function is needed for which of the following purposes?
Re-create a suspect drive to show what happened.
Create a copy of a drive for other investigators.
Re-create a drive compromised by malware.
All of the above
All of the above
The verification function does which of the following?
Proves that a tool performs as intended
Creates segmented files
Proves that two sets of data are identical via hash values
Verifies hex editors
Proves that two sets of data are identical via hash values
Forensics software tools are grouped into ______ and ______ applications.
Portable, Desktop
Mobile, PC
Local, remote
GUI, command-line
GUI, command-line
Data can’t be written to disk with a command-line tool.
True
False
False
Which of the following is true of most drive-imaging tools?
They perform the same function as a backup.
They ensure that the original drive doesn’t become corrupt and damage the digital evidence.
They must be run from the command line.
All of the above
They ensure that the original drive doesn’t become corrupt and damage the digital evidence.
Focus
A live acquisition can be replicated.
True
False
False
When using a write-blocking device you can’t remove and reconnect drives without having to shut down your workstation.
True
False
False
A log report in forensics tools does which of the following?
Tracks file types
Monitors network intrusion attempts
Records an investigator’s actions in examining a case
Lists known good files
Records an investigator’s actions in examining a case
Data viewing, keyword searching, decompressing are three subfunctions of the extraction function.
True
False
True
When validating the results of a forensic analysis, you should do which of the following?
Calculate the hash value with two different tools.
Repeat the steps used to obtain the digital evidence, using the same tool, and recalculate the hash value to verify the results.
Use a command-line tool and then a GUI tool.
None of the above
Calculate the hash value with two different tools.