Test 4 Flashcards
Which of the following is not a type of computer connector?
A)
USB
B)
SATA
C)
IDS
D)
FireWire
C)
IDS
Web browsers cache web pages that the user visited recently. This cached data is referred to as a temporary Internet file, and it is stored in a folder on the user’s hard drive.
A) True B) False
A) True
An e-mail header can have more than one Received field.
A) True B) False
A) True
A ________________ systematically tries every conceivable combination until a password is found, or until all possible combinations have been exhausted.
Brute force attack
______________ A technique that you can use to determine if the extension of a file has been changed.
(Signature analysis, Signature)
Metadata is a data component that describes other data. In other words, it’s data about data.
A) True B) False
A) True
A criminal can conceal data in hidden disk partitions.
A) True B) False
A) True
On a Windows 7 computer, what is the name of the feature that stores user names, passwords, and other credentials?
A)
Credential Manager
B)
Security Accounts Manager (SAM)
C)
Password Vault Manager
D)
Password.pwl
A)
Credential Manager
In Linux, which directory holds the security logs?
A)
/Sec/Log/
B)
/Logs/Security/
C)
/Var/Syslog/Log/
D)
/Var/Log/
D)
/Var/Log/
Suspects can hide data in which of the following locations? (Choose all that apply.)
A)
White space in documents
B)
Behind graphics in documents
C)
USB port
D)
Host protected areas (HPAs) on drives
A)
White space in documents
B)
Behind graphics in documents
D)
Host protected areas (HPAs) on drives
_________ is the process of translating an encrypted message back into the original unencrypted message.
___Decryption___
Which of the following security principles assures that a message originated from the stated source?
A)
Confidentiality
B)
Integrity
C)
Authentication
D)
Nonrepudiation
D)
Nonrepudiation
Which of the following uses the same value to encrypt and decrypt text?
A)
Private key algorithm
B)
Public key algorithm
C)
Transposition cipher
D)
Substitution cipher
A)
Private key algorithm
A _________ algorithm uses one key to encrypt plaintext and another key to decrypt ciphertext.
public key, public-key
A key that is 4 bits in length can represent how many different key values? Hint: 2^4
A)
16
B)
32
C)
64
D)
128
A)
16
A ______________ attack decrypts a file characterized by comparing ciphertext to a plaintext message you chose and encrypted.
__plaintext_
Of the following symmetric encryption algorithms, which one latest and strongest standard adopted by the U.S. government, with key sizes of 128, 192, or 256 bits?
A)
Blowfish
B)
Advanced Encryption Standard (AES)
C)
Serpent
D)
Twofish
B)
Advanced Encryption Standard (AES)
Social engineering can be an effective method of obtaining a password.
A) True B) False
A) True
Encryption is the practice of hiding one message in another, larger message.
A) True B) False
B) False
BONUS: who designed the Blowfish cipher?
(Bruce Schneier, Schneier)
BONUS: A valid definition of digital evidence is
A)
Data stored or transmitted using a computer
B)
Information of probative value
C)
Digital data of probative value
D)
Any digital evidence on a computer
C)
Digital data of probative value
BONUS: Computers can be involved in which of the following types of crime?
A)
Homicide and sexual assault
B)
Computer intrusions and intellectual property theft
C)
Civil disputes
D)
All of the above
D)
All of the above
BONUS: A logon record tells us that, at a specific time:
A)
An unknown person logged into the system using the account
B)
The owner of a specific account logged into the system
C)
The account was used to log into the system
D)
None of the above
C)
The account was used to log into the system
BONUS: The criminological principle which states that, when anyone, or anything, enters a crime scene he/she takes something of the scene with him/her, and leaves something of himself/herself behind, is:
A)
Locard’s Exchange Principle
B)
Differential Association Theory
C)
Beccaria’s Social Contract
D)
None of the above
A)
Locard’s Exchange Principle