Test 3 Flashcards
Which of the following tools runs only on Windows and allows you to capture a disk image over a network without being physically connected to a suspect computer?
A)
ProDiscover
B)
dd
C)
DriveSpy
D)
Norton Ghost
A)
ProDiscover
BONUS: A forensic crime scene processing kit should contain quantities of those items used to process computer equipment.
1) True 2) False
1) True
Which of the following is NOT an artifact that will be irrevocably lost if the computer is shut down?
1)
Running processes
2)
Open network ports
3)
Data stored in memory
4)
System date and time
4)
System date and time
The ________ command lets you see where a network packet is being sent and received in addition to all the places it goes along the way to its destination.
traceroute, tracert
__________, by Guidance Software, runs on Windows workstation and server operating systems, and is one of the most complete forensic suites available.
(EnCase)
BONUS: The forensic crime scene processing kit should include all of the following, EXCEPT:
1)
Evidence bags, tags, and other items to label and package evidence
2)
Forensically sanitized hard drives to store acquired data
3)
Compilers for developing forensic tools on site
4)
Hardware write blockers
3)
Compilers for developing forensic tools on site
What are advantages to using solid-state drives for storing collected forensic data?
A)
Less expensive than electromechanical disks
B)
Fewer failures
C)
Higher disk capacities
D)
Faster access times
B)
Fewer failures
D)
Faster access times
Which of the following tools creates a VMware virtual machine from a physical disk or raw disk image?
A)
Live View
B)
WinHex
C)
Java Virtual View
D)
Netstat
Correct Answer
A)
Live View
In regard to preservation, in a child pornography investigation, which of the following should be collected?
1)
Photographs
2)
Papers
3)
Digital cameras
4)
All of the above
4)
All of the above
Chain of custody documents record who handled the evidence, when, where, and for what purpose.
1) True 2) False
1) True
The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.
1)
Evidence inventory
2)
Chain of custody
3)
Evidence intake
4)
Preservation notes
2)
Chain of custody
Mobile devices may contain several kinds of memory, including volatile and nonvolatile memory, such as flash.
A) True B) False
A) True
“dd” is the only way to make a bitstream copy.
1) True 2) False
1) True
BONUS: Since computer seizures usually happen pretty much the same way, there is no real need to do any pre-planning.
1) True 2) False
2) False
BONUS: If possible, prior to entering a crime scene, it is useful to try and determine what kind of computer equipment to expect.
1) True 2) False
1) True