SEC+ Revision Questions Introduction to Computer Forensics Flashcards
What must be determined by the first responder to an incident?
A. The severity of the event
B. Which other personnel must be called in
C. The dollar amount associated with the incident
D. Who is at fault
A. The severity of the event
After seizing computer equipment alleged to have been involved in a crime, it is left in a corridor unattended for ten minutes while officers subdue a violent suspect. The seized equipment is no longer admissible as evidence because of what violation?
A. Order of volatility
B. Damage control
C. Chain of custody
D. Time offset
C. Chain of custody
A warrant has been issued to investigate a server believed to be used to swap credit card information by organized crime. Following the order of volatility, which data should you collect first?
A. Electronic memory (RAM)
B. Hard disk
C. USB flash drive
D. CMOS
A. Electronic memory (RAM)
A server configured with a RAID-5 array must be properly imaged to preserve the original state of the data. You decide against imaging each physical hard disk in the array. Which two tasks must you perform? (Choose two.)
A. Change the server CMOS boot order.
B. Image the array as a single logical disk.
C. Ensure your imaging solution supports RAID.
D. Update the firmware for the RAID controller.
B. Image the array as a single logical disk.
&
C. Ensure your imaging solution supports RAID.
While capturing network traffic, you notice an abnormally excessive number of outbound SMTP packets. To determine whether this is an incident that requires escalation, what else should you consult?
A. The contents of your inbox
B. The mail server log
C. The mail server documentation
D. The web server log
B. The mail server log
You decide to work late on a Saturday night to replace wiring in your server room. Upon arriving, you realize there has been a break-in and server backup tapes appear to be missing. What should you do as law enforcement officials arrive?
A. Clean up the server room.
B. Sketch a picture of the broken-into premises on a notepad.
C. Alert officials that the premise has surveillance video.
D. Check the surrounding area for the perpetrator.
C. Alert officials that the premise has surveillance video.
Which of the following best visually illustrates the state of a computer at the time it was seized by law enforcement?
A. Digital photograph of the motherboard
B. Screenshot
C. Visio network diagram
D. Steganography
B. Screenshot
Choose the correct order of volatility when collecting digital evidence:
A. Hard disk, DVD-R, RAM, swap file
B. Swap file, RAM, DVD-R, hard disk
C. RAM, DVD-R, swap file, hard disk
D. RAM, swap file, hard disk, DVD-R
D. RAM, swap file, hard disk, DVD-R
What can a forensic analyst do to reduce the number of files that must be analyzed on a seized disk?
A. Write a Visual Basic script.
B. Delete files thought to be operating system files.
C. Ensure the original disk is pristine and use a hash table on a copy of the files.
D. Ensure the original disk is pristine and use a script to process a copy of the files.
C. Ensure the original disk is pristine and use a hash table on a copy of the files.
A professional who is present at the time of evidence gathering can be summoned to appear in court or to prepare a report on their findings for use in court. What is this person referred to as?
A. Plaintiff
B. Defendant
C. Auditor
D. Forensic expert witness
D. Forensic expert witness
Which of the following best describes chain of custody?
A. Delegating evidence collection to your superior
B. Preserving, protecting, and documenting evidence
C. Capturing a system image to another disk
D. Capturing memory contents before hard disk contents
B. Preserving, protecting, and documenting evidence
In working on an insider trading case, you are asked to prove that an e-mail message is authentic and was sent to another employee. Which items should you consider? (Choose two.)
A. Was the message encrypted?
B. Was the message digitally signed?
C. Are user public keys properly protected?
D. Are user private keys properly protected?
B. Was the message digitally signed?
&
D. Are user private keys properly protected?
What type of evidence would be the most difficult for a perpetrator to forge?
A. IP address
B. MAC address
C. Cell phone SIM card
D. Documents on a USB flash drive
C. Cell phone SIM card
What is the purpose of disk forensic software? (Choose two.)
A. Using file encryption to ensure copied data mirrors original data
B. Using file hashes to ensure copied data mirrors original data
C. Protecting data on the original disks
D. Creating file hashes on the original disks
B. Using file hashes to ensure copied data mirrors original data
&
C. Protecting data on the original disks
You are preparing to gather evidence from a cell phone. Which of the following is false?
A. CDMA mobile devices do not use SIM cards.
B. CDMA mobile devices store user data on the mobile device.
C. GSM mobile devices do not use SIM cards.
D. GSM mobile devices use SIM cards.
C. GSM mobile devices do not use SIM cards.