Preassessment attempt 1 Flashcards
Which law requires both parties to consent to the recording of a conversation?
Electronic Communications Privacy Act (ECPA)
Communications Assistance to Law Enforcement Act (CALEA)
USA Patriot Act
Health Insurance Portability and Accountability Act (HIPAA)
Electronic Communications Privacy Act (ECPA)
Which law is related to the disclosure of personally identifiable protected health information (PHI)?
Federal Privacy Act of 1974
Electronic Communications Privacy Act
Health Insurance Portability and Accountability Act (HIPAA)
CAN-SPAM Act
Health Insurance Portability and Accountability Act (HIPAA)
Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?
18 U.S.C. 2252B
CAN-SPAM Act
Children’s Online Privacy Protection Act (COPPA)
Communications Decency Act
18 U.S.C. 2252B
Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?
The Privacy Protection Act (PPA)
The Federal Privacy Act
The Communications Assistance to Law Enforcement Act (CALEA)
The Electronic Communications Privacy Act (ECPA)
The Privacy Protection Act (PPA)
Which law or guideline lists the four states a mobile device can be in when data is extracted from it?
NIST SP 800-72 Guidelines
The USA Patriot Act
NIST SP 101r1 Guidelines
The Electronic Communications Privacy Act (ECPA)
NIST SP 800-72 Guidelines
Which law includes a provision permitting the wiretapping of VoIP calls?
Communications Assistance to Law Enforcement Act (CALEA)
USA Patriot Act
Electronic Communications Privacy Act (ECPA)
Sarbanes-Oxley Act (SOX)
Communications Assistance to Law Enforcement Act (CALEA)
Which policy is included in the CAN-SPAM Act?
The email sender must provide some mechanism whereby the receiver can opt out of future emails and that method cannot require the receiver to pay in order to opt out.
Whoever knowingly uses a misleading domain name on the Internet with the intent to deceive a person into viewing material constituting obscenity shall be fined or imprisoned not more than 2 years, or both.
Law enforcement officers may now intercept communications to and from the computer trespasser if they have reasonable grounds to believe that the trespasser’s communications will be relevant to the investigation.
A business can claim the business extension exemption only for monitoring by certain types of equipment; the recording must occur in the ordinary course of business.
The email sender must provide some mechanism whereby the receiver can opt out of future emails and that method cannot require the receiver to pay in order to opt out.
Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities for federal agencies?
Electronic Communication Privacy Act (ECPA)
Communication Assistance to Law Enforcement Act (CALEA)
Foreign Intelligence Surveillance Act (FISA)
USA Patriot Act
Communication Assistance to Law Enforcement Act (CALEA)
Which law requires a search warrant or one of the recognized exceptions to the search warrant requirements for searching email messages on a computer?
The CAN-SPAM Act
The Fourth Amendment to the U.S. Constitution
USC 2252B
The Communication Assistance to Law Enforcement Act
The Fourth Amendment to the U.S. Constitution
Where are local passwords stored for the Windows operating system?
SAM file in \Windows\System32\
SAM file in \Windows\Security\
In the registry key HKEY_LOCAL_MACHINE\SYSTEM
In the registry key HKEY_LOCAL_MAHCINE\SECURITY
SAM file in \Windows\System32\
Where on a Windows system is the config folder located that contains the SAM file?
C:\Windows\System32
C:\Windows\SystemResources
C:\Program Files
C:\Users
C:\Windows\System32
A forensic examiner wants to try to extract passwords for wireless networks to which a system was connected.
Where should passwords for wireless networks be stored on a Windows XP system?
BIOS
Registry
Program Files
Bash
Registry
Which Windows password cracking tool uses rainbow tables?
Ophcrack
ComputerCOP
Sleuth Kit
Digital Intelligence
Ophcrack
How does a rainbow table work to crack a password?
It uses a table of all possible keyboard combinations and their hash values, then searches for a match.
It uses a table to store hash value for every character in the alphabet, then assembles them to create a match.
It starts with a hashed password and then decrypts each individual character.
It searches for passwords stored in RAM and startup files and then matches them to the predefined table.
It uses a table of all possible keyboard combinations and their hash values, then searches for a match.
What should a forensic investigator use to gather the most reliable routing information for tracking an email message?
Email header
Email address
Tracert
Netstat
Email header
Which activity involves email tracing?
Determining the ownership of the source email server
Making bit-by-bit copies of each of the email servers involved
Performing nslookup on the recipient of the message
Removing email header information
Determining the ownership of the source email server
A forensic examiner reviews a laptop running OS X which has been compromised. The examiner wants to know if there were any mounted volumes created from USB drives.
Which digital evidence should be reviewed?
/var/log
/var/vm
/Users/<user>/.bash_history</user>
/Users/<user>/Library/Preferences</user>
/var/log
Which log or folder contains information about printed documents on a computer running Mac OS X?
/var/spool/cups
/var/log
/var/vm
/var/log/lpr.log
/var/spool/cups
Which Windows event log should be checked for evidence of invalid logon attempts?
Security
System
Application
ForwardedEvents
Security
A cyber security organization has issued a warning about a cybercriminal who is using a known vulnerability to attack unpatched corporate Macintosh systems. A network administrator decides to examine the software updates logs on a Macintosh system to ensure the system has been patched.
Which folder contains the software updates logs?
/Library/Receipts
/var/spool/cups
/proc
/var/log
/Library/Receipts