Module 9 Quiz Flashcards

1
Q

If an application uses salting when creating passwords, what concerns should a forensics examiner have when attempting to recover passwords?

Salting can make password recovery extremely difficult and time consuming.

The effect on the computer’s CMOS clock could alter files’ date and time values.

There are no concerns because salting doesn’t affect password-recovery tools.

Salting applies only to OS startup passwords, so there are no serious concerns for examiners.

A

Salting can make password recovery extremely difficult and time consuming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rainbow tables serve what purpose for digital forensics examinations?

Rainbow tables are designed to enhance the search capability of many digital forensics examination tools.

Rainbow tables are a supplement to the NIST NSRL library of hash tables.

Rainbow tables contain computed hashes of possible passwords that some password-recovery programs can use to crack passwords.

Rainbow tables provide a scoring system for probable search terms.

A

Rainbow tables contain computed hashes of possible passwords that some password-recovery programs can use to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Suppose you’re investigating an e-mail harassment case. Generally, is collecting evidence for this type of case easier for an internal corporate investigation or a criminal investigation?

Internal corporate investigation because corporate investigators typically have ready access to company records

Internal corporate investigation because ISPs almost always turn over e-mail and access logs when requested by a large corporation

Criminal investigation because subpoenas can be issued to acquire any needed evidence quickly

Criminal investigation because law enforcement agencies have more resources at their disposal

A

Internal corporate investigation because corporate investigators typically have ready access to company records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which forensic image file format creates or incorporates a validation hash value in the image file?

Expert Witness

AFF

SMART

All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

After you shift a file’s bits, the hash value remains the same.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The National Software Reference Library provides what type of resource for digital forensics examiners?

A repository for software vendors to register their developed applications

A list of MD5 and SHA1 hash values for all known OSs and applications

A list of digital forensics tools that make examinations easier

Reference books and materials for digital forensics

A

A list of MD5 and SHA1 hash values for all known OSs and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

For which of the following reasons should you wipe a target drive?

a: To ensure the quality of digital evidence you acquire

b: To make sure unwanted data isn’t retained on the drive

Both a and b

Neither of the above

A

Both a and b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Known File Filter (KFF) can be used for which of the following purposes?

a: Filter known program files from view.

b: Calculate hash values of image files.

c: Compare hash values of known files with evidence files.

Both a and c

A

Both a and c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Commercial encryption programs often rely on key escrow technology to recover files if a password or passphrase is lost.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You’re using Disk Management to view primary and extended partitions on a suspect’s drive. The program reports the extended partition’s total size as larger than the sum of the sizes of logical partitions in this extended partition. What might you infer from this information?

Nothing; this is what you’d expect to see.

The disk is corrupted.

There’s a hidden partition.

The drive is formatted incorrectly.

A

There’s a hidden partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In steganalysis, cover-media is which of the following?

The type of steganographic method used to conceal a message

The file a steganography tool uses to host a hidden message, such as a JPEG or an MP3 file

A specific type of graphics file used only for hashing steganographic files

The content of a file used for a steganography message

A

The file a steganography tool uses to host a hidden message, such as a JPEG or an MP3 file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scope creep happens when an investigation goes beyond the bounds of its original description.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The likelihood that a brute-force attack can succeed in cracking a password depends heavily on the password length.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following represents known files you can eliminate from an investigation?

Files associated with an application

Any graphics files

Any files pertaining to the company

All of the above

A

Files associated with an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Block-wise hashing has which of the following benefits for forensics examiners?

Allows validating sector comparisons between known files

Provides a faster way to shift bits in a block or sector of data

Provides a method for hashing sectors of a known good file that can be used to search for data remnants on a suspect’s drive

Verifies the quality of OS files

A

Provides a method for hashing sectors of a known good file that can be used to search for data remnants on a suspect’s drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Steganography is used for which of the following purposes?

Validating data

Accessing remote computers

Hiding data

Creating strong passwords

A

Hiding data

17
Q

Password recovery is included in all forensics tools.

True

False

A

False