Test 3 Flashcards

1
Q

Which of the following tools runs only on Windows and allows you to capture a disk image over a network without being physically connected to a suspect computer?

A)

ProDiscover

B)

dd

C)

DriveSpy

D)

Norton Ghost

A

A)

ProDiscover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BONUS: A forensic crime scene processing kit should contain quantities of those items used to process computer equipment.

1) True
2) False
A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT an artifact that will be irrevocably lost if the computer is shut down?

1)

Running processes

2)

Open network ports

3)

Data stored in memory

4)

System date and time

A

4)

System date and time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ________ command lets you see where a network packet is being sent and received in addition to all the places it goes along the way to its destination.

A

traceroute, tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________, by Guidance Software, runs on Windows workstation and server operating systems, and is one of the most complete forensic suites available.

A

(EnCase)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BONUS: The forensic crime scene processing kit should include all of the following, EXCEPT:

1)

Evidence bags, tags, and other items to label and package evidence

2)

Forensically sanitized hard drives to store acquired data

3)

Compilers for developing forensic tools on site

4)

Hardware write blockers

A

3)

Compilers for developing forensic tools on site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are advantages to using solid-state drives for storing collected forensic data?

A)

Less expensive than electromechanical disks

B)

Fewer failures

C)

Higher disk capacities

D)

Faster access times

A

B)

Fewer failures

D)

Faster access times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following tools creates a VMware virtual machine from a physical disk or raw disk image?

A)

Live View

B)

WinHex

C)

Java Virtual View

D)

Netstat

A

Correct Answer
A)

Live View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In regard to preservation, in a child pornography investigation, which of the following should be collected?

1)

Photographs

2)

Papers

3)

Digital cameras

4)

All of the above

A

4)

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Chain of custody documents record who handled the evidence, when, where, and for what purpose.

1) True
2) False
A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.

1)

Evidence inventory

2)

Chain of custody

3)

Evidence intake

4)

Preservation notes

A

2)

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile devices may contain several kinds of memory, including volatile and nonvolatile memory, such as flash.

A) True
B) False
A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

“dd” is the only way to make a bitstream copy.

1) True
2) False
A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BONUS: Since computer seizures usually happen pretty much the same way, there is no real need to do any pre-planning.

1) True
2) False
A

2) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BONUS: If possible, prior to entering a crime scene, it is useful to try and determine what kind of computer equipment to expect.

1) True
2) False
A

1) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following tools is not strictly a forensic tool, but it does provide the ability to create disk copies that are almost exact copies of the original?

A)

ProDiscover

B)

dd

C)

DriveSpy

D)

Norton Ghost

A

D)

Norton Ghost

17
Q

The main advantage to using software (versus hardware) to acquire data images is increased speed.

A) True
B) False
A

B) False

18
Q

A forensic tool, such as Paraben Device Seizure, enables you to acquire which of the following types of data from a portable device? (Choose all that apply.)

A)

Text message history

B)

Deleted text messages

C)

Phonebook

D)

Call history

A

A)

Text message history

B)

Deleted text messages

C)

Phonebook

D)

Call history

19
Q

Which of the following items should you document when you examine a PC and make an image of its drive or memory contents? (Choose all that apply.)

A)

System date and time from the BIOS

B)

Drive parameters and boot order

C)

System serial numbers

D)

A and C only

A

A)

System date and time from the BIOS

B)

Drive parameters and boot order

C)

System serial numbers

20
Q

Which open source toolkit provides collections of tools, such as file system tools, volume system tools, image file tools, disk tools, and other tools?

A)

Forensic Toolkit (FTK)

B)

The Sleuth Kit (TSK)

C)

SIFT

D)

SMART

A

B)

The Sleuth Kit (TSK)

21
Q

Which of the following was originally developed by SANS as a toolkit for students in the SANS Computer Forensic Investigations and Incident Response course?

A)

SIFT

B)

SMART

C)

NetAnalysis

D)

TSK

A

A)

SIFT

22
Q

Because of the nature of non-volatile data, it should always be collected first to minimize corruption or loss.

A) True
B) False
A

B) False

23
Q

WinHex is a Windows-based universal ___________ editor and disk management utility.

A

___Hex___

24
Q

You can compress and split drive images for efficient storage.

A) True
B) False
A

A) True

25
Q

Host protected areas (HPAs) are created specifically to allow manufacturers to hide diagnostic and recovery tools.

A) True
B) False
A

A) True

26
Q

__________ is the process of creating a complete copy of a disk drive where the disk is copied sector-by-sector.

A

Imaging

27
Q

A ___________ backup (also known as a mirror image or evidence grade backup) is used to create an exact replica of a storage device.

A

bit stream, bitstream