Test 2 Flashcards
You are completing a chain of custody for seizing a hard drive. Which of the following steps is out of order?
A)
Seize the drive.
B)
Create an exact image of the drive.
C)
Analyze the data on the drive.
D)
Mount the drive in read-only mode.
D)
Mount the drive in read-only mode.
Which of the following are limitations to salvaging data through data carving?
1)
File name and date-time stamps that were associated with the file are not salvaged.
2)
The size of the original file may not be known, making it necessary to guess how much
data to carve out.
3)
Simple carving assumes all portions of the file were stored contiguously, and not
fragmented.
4)
All of the above.
4)
All of the above.
Whenever you introduce documentary evidence, you must introduce an original document, not a copy. This is called the ________ rule. (two words)
Best evidence
An independent computer forensic investigator can execute a search warrant.
1) True 2) False
2) False
Removable or external media generally contain intentionally archived and/or transient files.
1) True 2) False
1) True
The proper collection of evidence at a crime scene is crucial in terms of admissibility in court.
1) True 2) False
1) True
Taking photos of real evidence is part of the chain of custody.
1) True 2) False
1) True
You must often find specific keywords or phrases that appear in large numbers of files. Which tool should you use?
A)
File viewer
B)
Extension checker
C)
Unerase tool
D)
Searching tool
D)
Searching tool
You seized a PDA as evidence during an investigation. You extracted the information and analyzed it to find what you were looking for. You left the PDA powered on in its charger while stored. While testifying as an expert witness in court, you are asked if the data in the PDA has changed. You should truthfully answer “Yes.”
1) True 2) False
1) True
You need to perform a drive integrity check. You use a forensic tool to calculate a hash value. Which of the following might you end up with? (Choose all that apply.)
A)
UFD
B)
CFTT
C)
MD5
D)
SHA-1
C)
MD5
D)
SHA-1
Shutting a system down prevents entries from being written to activity log files and preserves the state of the evidence.
1) True 2) False
2) False
Since crime scenes are typically pretty much the same, very little planning needs to take place prior to first entering the scene.
1) True 2) False
2) False
When entering a crime scene, the initial survey should:
1)
Include user manuals
2)
Involve tracing cables
3)
Collect relevant data such as passwords and account details
4)
All of the above
4) All of the above
A company that suffered a security breach refuses to hand over computer evidence because of the possibility of additional sensitive information being leaked. Which of the following search and seizure methods is most appropriate to engage?
A)
Voluntary surrender
B)
Subpoena
C)
Search warrant
D)
None of the above
B) Subpoena
Fingerprints are an example of which type of evidence?
A)
Real
B)
Documentary
C)
Testimonial
D)
Demonstrative
A) Real