What you need to know Flashcards

1
Q

Daubert standard:

A

Standard used by a trial judge to make a preliminary assessment of whether an expert’s
scientific testimony is based on reasoning or methodology that is scientifically valid and can
properly be applied to the facts at issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Communications Assistance to Law Enforcement Act of 1994 (CALEA)

A

a federal wiretap law for
traditional wired telephony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Electronic Communications Privacy Act of 1986

A

governs the privacy and disclosure,
access, and interception of content and traffic data related to electronic communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Children’s Online Privacy Protection Act of 1998 (COPPA)

A

protects children 13 years of age
and under from the collection and use of their personal information by websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Wireless Communications and Public Safety Act of 1999

A

allows for collection and use of
“empty” communications, which means nonverbal and nontext communications, such as GPS
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

five types of drive connections:

A

● Integrated Drive Electronics (IDE) [spoiler answer]
● Extended Integrated Drive Electronics (EIDE)
● Parallel Advanced Technology Attachment (PATA)
● Serial Advanced Technology Attachment (SATA)
● Serial SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Solid-state drives

A

use Negated AND (NAND) gate–based flash memory,
which retains memory even without power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

advanced forensic file format

A

AFF file
format is part of the AFF Library and Toolkit, which is a set of open-source computer forensics
programs. Sleuth Kit and Autopsy both support this file format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EnCase

A

Creates exact copy of hard drive. EnCase calculates an MD5 hash when the drive is acquired. This hash is
used to check for changes, alterations, or errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Forensic Toolkit (FTK) from AccessData

A

useful at cracking passwords.
provides tools to search and analyze the Windows Registry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Steganography

A

art and science of writing hidden messages. common methods
of performing this technique is the least significant bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

basic steganography terms

A

-Payload is the information to be covertly communicated.
-Carrier (or carrier file) is the signal, stream, or file in which the payload is hidden.
-Channel is the type of medium used. This may be a passive channel, such as photos,
video, or sound files,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ophcrack

A

depend on rainbow tables. Ophcrack is usually very
successful at cracking Windows local machine passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GUID Partition Table

A

used primarily with computers that have an Intel-based processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The /etc Directory

A

where configuration files are located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Doctor

A

recovers all Inbox and Outbox data and all contacts data, and has
an easy-to-use interface.

17
Q

XRY

A

breaking an iPhone passcode.

18
Q

When a file is deleted on the iPhone, iPad, or iPod,

A

.Trashes\501 folder.

19
Q
A