Set 4 Flashcards

1
Q

What is Lockard’s exchange principle?

A

If something is taken than there will be a trace of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While dinner with her family, tw police officers want to search her rouse with a warrant and without consent, what is this called?

A

unreasonable search 4th amendment violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In 2020 a driver ran a light, the driver of other car must have medical care, the drunk driver is sued under ____ law.

A

tort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 5 w h?

A

who, what, when, where, how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dr cooper dark matter uses scientific method, wht is first step of scientific method?

A

Ask a question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

George is ist for company as the forensic analyst he is not responsible for,

Discovering malicious activity
Getting systems back online
Ensuring all collected evidence follows chain of custody

A

Ensuring all collected evidence follows chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Local police department, police investigated crime scene murder, the dfi goes inside victims office what two things does he do?

sean does a memory dump,
sean is performing live collection,
dead collection,
sean does not require a warrant,

A

sean is performing live collection
sean does not require a warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Convert 34 to binary

convert 1001010 to decimal

A

100010

74

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

First bytes of a file are called?

A

Magic bytes, they tell the OS what kind of file it is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What isn’t an anti forensics technique?

data wiping,
physical destruction,
defragmentation,
encryption

A

defragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What must be completed each time evidence is moved?

A

chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the different phases of the forensic analyst process, 6 of them?

A

pre-investigation,
preparing the investigation,
search and seizure,
analyze,
report and testify,
post investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Certified data forensic lab has what accredited standard,

A

iso-eic-17025,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cluley works in data forensics lab, collects and retrieves digital evidence, called to testify in court. What fits him?

officer,
manager,
analyst,
investigator

A

analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Melissa works in data forensics lab, she collects and preserves digital evidence, called to testify in court. What is she?

officer,
manager,
analyst
investigator

A

investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What isn’t a Technical control?

Intrusion detection,
backups,
emergency repose procedures,

A

emergency repose procedures,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Police department team want to investigate crime scene goes into victim office and see laptop is turned on but screen is blank, what to do?

A

Move the mouse

18
Q

Data forensics analyst investigate corporate and look at suspicious, employee internet activity on watchlist, before you got further you must get permission from _____

A

hr and legal

19
Q

What equipment to use not contaminate digital evidence?

write blocker,
diode,
FTK

A

Write blocker

20
Q

Detective gets info that gang has stolen computers, before officers can enter they must get a warrant, an affidavit is needed, what does detective need to get a warrant?

A

Probable cause

21
Q

Officer spots suspects loading computers into a truck what allows officers to search truck?

A

exigent cicumstances

22
Q

Computers are outside the warehouse victims name is on the computer?

A

plain view doctrine

23
Q

Tcp and udp operate in what layer?

A

the 4th layer or transport layer

24
Q

Which is not considered a common data acquisition practice?

making a true copy,
making a copy of a copy,
ensuring mace attributes are unchanged,
downloading an application on target system,

A

downloading an application on target system,

25
Q

Memory image can do a through analysis, mark found cracked copy to perform the analysis what part of the code of ethics did she violate?

A

No 5. Using illegal software

26
Q

Julia doing hard drive analysis she knows the suspect, she notifies the lab manager what part of the code of ethics did she violate?

A

None

27
Q

What would not break code of ethics?

diligent work,
remain neutral,
will except cases beyond the level of my ability

A

will except cases beyond the level of my ability

28
Q

Which of the following is the most commonly used?

A

web application attack

29
Q

What nom profit organization provides common web attacks?

A

OWASP (Open Worldwide Application Security Project)

30
Q

Web server log ,what is a good indicator of the address of a hacking tool?

A

look for geck commands or nmap, nikto

31
Q

What commands help find file names while looking at web logs?

A

get, POST

32
Q

Which is used on smartphone to store contacts emails and texts?

A

SIM CARD

33
Q

Can be used to take byte by byte memory of phone that’s been damaged?

j tag,
chip off,
static compression

A

j tag,
chip off,

34
Q

What are the ports?

http
secure web
FTp
SECURE SHELL
Telnet

A

http is port 80
secure web is tcp 443
FTp IS 21
SECURE SHELL IS 22
Telnet is 23

35
Q

What sends event log data form a host to storage?

secure shell,
ntp,
smtp,
syslog

A

syslog

36
Q

Which is used to ensure system clocks are synced?

A

NTP (Network Time Protocol)

37
Q

Tasklist from windows, which process is the highest PID?

A

Biggest number is answer

38
Q

Which is not volatile?

A

Shadow volume copy

39
Q

Pslogged on > output,txt What does this command do?

A

list of users that are logged on is created in a text

40
Q

Steganography?

A

Hiding data inside another from or data like text or image

41
Q

Which is better Md5 or sha1?

A

SHA1 is better

42
Q

Which is not focused on an investigation of windows based host?

Windows Registry,
memory dump,
security analyzer database,

A

Security analyzer database,