Sett 2 Flashcards

1
Q

Which is not a formal position in a forensics lab?

Investigator, manager, analyst, legal manager

A

Legal manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the CERT standards for a forensic laboratory?

A

ASCLD (American Society of Crime Laboratory Directors) does the test and their process is based on ISO 17025:2005.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which role develops and forces lab policies?

A

lab manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What role is testifying the facts of data gathered?

A

Analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is not a service offered by a forensics lab?

A

Adversary emulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Parking lot security and biometric authentication are what level security?

A

Lab level 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical control, neither, or tech control?

Fencing
ballards
identity management
firewalls
security
training
procedures

A

Fencing, ballards phys

identity management, firewalls, security tech

training, procedures neutral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cc television is what physical security control?

Preventative, detective, corrective, recovery, deterrent, or compensate

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

George needs a forensics package that is free to use and can examine images of hard drives. What should he use?

A

Autopsy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ken is a lead investigator, he surveys a crime scene. What tool will not contaminate digital evidence?

A

Write Blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Company is closing, highly sensitive data is on their systems what sanitization method must be used?

A

Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which is not a santitization term?

A

Wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Maintained by SANS to help with forensic issues?

A

SIFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What company does specification for data sanitization standards?

A

NIST (National Institute of Standards Technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which org certifies free tools to examine images on a hard drive?

A

CFTT (The Computer Forensics Tool Testing) Handbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Before you seize any evidence what must you have?

A

A warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

As a member of her organization’s IS team, Larissa is performing a data forensic investigation involving 3 members of the corporate finance team. Before Larissa can seize any evidence from the suspects employee’s computer, she must have an active warrant? True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5th amendment is search and seizure? True or False

A

False/4th amendment is search and seizure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Going to a judge with a request to seize digital evidence the request must provide what?

A

Probable cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Evidence may be seized without a warrant if people are in danger, these are called what?

A

Exigent circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Seize evidence if you see incriminating evidence?

A

Plain view doctrine

22
Q

Cyber policy employee system might be monitored, this policy is called what?

A

Login banner

23
Q

Michelle is completing an affidavit for review with a judge. Which of the following would she not include in the document?

A

A reference number to the approved warrant

24
Q

What does the dd command do? sudo dd command?

A

Used to make a forensic bit-by-bit copy of a drive to a number of locations.
Disk to disk
disk to image
disk to network

sudo runs that shit with admin priv maybe idk

25
Q

Which of the following is not considered an aspect used to define a crime scene?

A

Locations where witnesses are located

26
Q

Which of the following would not be considered an obligation to a first responder to a crime scene?

A

Allow all individuals to leave the scene

27
Q

Which is not considered a key to securely packaging evidence?

A

Contain arson evidence in a porous container

28
Q

Data forensic analyst who does not follow the appropriate evidence collection procedure can complete a statement of admissibility so any evidence that was potentially contaminated can still be considered admissible in a court of law? True or False

A

False

29
Q

Which of the following employee activities is considered most suspicious?

A

User appears to have connected to an FTP site in a residential ISP

30
Q

Which tool in windows can be used to create,delete, or manage disk volume?

A

Disk Part

31
Q

What could you use to prevent a running process on Linux from potentially destroying a corrupting digital evidence?

A

Pull the plug

32
Q

Command choice?

A

Halt

33
Q

Beau is a data forensic investigator for the FBI. A murder occurred in a large-scale office building in downtown Atlanta where Beau is called as a first responder. A suspect is at the scene with his laptop while Beau waits for a warrant to be approved by a judge. What steps could he take in order to seize and search the suspect’s laptop immediately?

A

Have the suspect sign a consent form

34
Q

When discussing numbered surveillance, which 2 layers of the OSI model contain addressing information which could be monitored and collected as metadata under various electronic surveillance laws?

A

Network and Transport

35
Q

Which of the following types of drives is not considered magnetic media?

A

Solid State

36
Q

Both flash memory such as SD cards, micro SD come with a switch that allows them to be place into read only mode to prevent corruption of evidence? True or False

A

True

37
Q

Which of the following systems would not be windows based?

A

Extension 4 (Linux)

38
Q

Two techniques used to compress graphics files?

A

Hoffman & LZW

39
Q

When a computer is first powered on the first phase which checks to ensure basic communication exist between critical parts of the system is called?

A

Post

40
Q

When referring to MACE properties, M means what?

A

Modified

41
Q

In a standard magnetic hard drive, concentric circles are written into platters and they’re referred to as?

A

Tracks

42
Q

Which of the following is not considered a standard interface for hard drives?

A

ISCA

43
Q

Which of the following raid configurations does not offer full tolerance?

A

Raid 0

44
Q

Which part of the sleuth kit commands could be used to recover deleted files from a hard drive?

A

iCat

45
Q

Which of the following processes is used by data forensic analyst to determine the presence of stenography in a file?

A

Steganalysis

46
Q

When using a tool such as autopsy or the sleuth kit to recover a deleted file from a hard drive you’re using a process known as?

A

File carving

47
Q

Which record in the MFT would have been damaged if I couldn’t tell you which file blocks were in use?

A

Spinning Rust

48
Q

A magnetic hard drive file system block is called a cluster. It is composed of a number of?

A

Sectors

49
Q

Which action is part of contingency planning for data acquisition?

A

Make a copy with two different tools

50
Q

Which of the following must be covered in a search warrant?

A

All of the above

51
Q

Which of the following is a characteristic that does not belong in a computer forensics lab?

A

Windows that open