Quiz 6 Flashcards
The microchip on the motherboard of a laptop or PC that is intended to deliver cryptographic functions is known as the
TPM
The key space or key length has no impact on one’s ability to break the encryption. It is only the complexity of character string making up the key which has an impact. True or False?
False
The best encryption algorithms are open and well published. The key should be the only secret. True or False?
True
All of the following encryption tools have the ability to perform FDE with the exception of
Encrypting File System (EFS)
If an examiner recognizes the presence of Bit Locker when dealing with a running computer, their best chance of recovering evidence is to pull the power plug. True or False?
False
According to Microsoft, a strong password uses a variety of letters, numbers, punctuation, and symbols and has a minimum length of eight characters. True or False?
False
Some of the most common hiding techniques include (choose all that apply)
changing file names and extensions.
hiding files within files.
Data which may have evidentiary value won’t be destroyed by defragmenting a drive because all the defragging process does is moves clusters as close as possible to improve performance. True or False?
False
A telltale sign of “wiping” is… when looking at the drive at a bit level, a distinct repeating pattern of data may be seen because this is different from what would normally be found on a hard drive in everyday use. True or False?
True
If you encrypt the word “ALGORITHM” using the Caesar Cipher with a key of eight the conversion of plain text to cipher text is
ITOWZQBPU