Untitled Deck Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is digital forensics?

A

Digital forensics is the process of recovering and investigating material found in digital devices, often in relation to computer crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: Digital forensics only applies to computers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: The first step in the digital forensics process is __________.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the term ‘chain of custody’ refer to in digital forensics?

A

The chain of custody refers to the documentation and handling process that ensures evidence is preserved and unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is NOT a type of digital forensics? A) Network forensics B) Malware forensics C) Audio forensics

A

C) Audio forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary goal of digital forensics?

A

To collect, preserve, analyze, and present digital evidence in a legally acceptable manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Digital forensics can be used in civil cases.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name one common tool used in digital forensics.

A

EnCase or FTK (Forensic Toolkit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the significance of ‘imaging’ in digital forensics?

A

Imaging refers to creating a bit-for-bit copy of digital evidence to analyze without altering the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does ‘data recovery’ mean in the context of digital forensics?

A

Data recovery is the process of retrieving lost or inaccessible data from storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: The process of examining and analyzing data in a digital forensic investigation is called __________.

A

Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which law governs the collection and presentation of digital evidence in the United States?

A

The Federal Rules of Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Digital forensics only involves software analysis.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a ‘forensic image’?

A

A forensic image is a complete copy of a storage device that captures all data, including deleted files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of ‘log files’ in digital forensics?

A

Log files record events and actions on a system, which can help in understanding user activity and system changes.

17
Q

What type of evidence can digital forensics recover from mobile devices?

A

Contacts, messages, call logs, photos, and application data.

18
Q

Fill in the blank: The principle of __________ states that data can be altered or destroyed during the forensic process.

A

Least privilege

19
Q

What is ‘malware forensics’?

A

Malware forensics is the study and analysis of malicious software to understand its behavior and impact.

20
Q

True or False: Digital forensics is only relevant to law enforcement agencies.

21
Q

What is the role of a digital forensic examiner?

A

To collect, analyze, and present digital evidence in investigations.

22
Q

What does ‘volatile data’ refer to?

A

Data that is temporarily stored and lost when a device is powered off, such as RAM.

23
Q

Fill in the blank: __________ analysis involves examining network traffic to identify suspicious activities.

24
Q

What is the purpose of using hash functions in digital forensics?

A

To verify the integrity of data by creating a unique digital fingerprint.

25
Q

True or False: Digital forensics can only be performed on Windows operating systems.

26
Q

What is ‘file carving’?

A

File carving is a technique used to recover files from unallocated space on a storage device.

27
Q

What is the difference between ‘static’ and ‘live’ forensics?

A

Static forensics involves analyzing a powered-off device, while live forensics examines a running system.

28
Q

Fill in the blank: __________ is a technique used to hide data within other files.

A

Steganography