cOMPUTER 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

On a Linux computer, ____ represents file systems exported to remote hosts.

/etc/exports

In Linux, most applications and commands are in the ____ directory or its subdirectories bin and sbin.

/usr

In the NTFS MFT, all files and folders are stored in separate records of ____ bytes each.

1024

____ attacks use every possible letter, number, and character found on a keyboard when cracking a password.

Brute force

____ records are data the system maintains, such as system log files and proxy server logs.

COMPUTER-GENERATED

The simplest method of duplicating a disk drive is using a tool that makes a direct ____ copy from the suspect disk to the target location.

DISK TO IMAGE

____ have some limitations in performing hashing, however, so using advanced ____ is necessary to ensure data integrity.

Digital forensics tools, hexadecimal editors

When an investigator finds a mix of information, judges often issue a limiting phrase to the warrant, which allows the police present all evidence together.

FALSE

Windows OSs do not have a kernel.

FALSE

From a network forensics standpoint, there are no potential issues related to using virtual machines.

False

Private-sector organizations include small to medium businesses, large corporations, and non-government organizations (NGOs), which always get funding from the government or other agencies.

False

You use ____ to create, modify, and save bitmap, vector, and metafile graphics.

GRAPHICS EDITOR

Most federal courts that evaluate digital evidence from computer-generated records assume that the records contain ____.

Hearsay

The simplest way to access a file header is to use a(n) ____ editor

Hexadecimal

Software forensics tools are commonly used to copy data from a suspect's disk drive to a(n) ____.

IMAGE FILE

In a files's inode, the first 10 pointers are called ____ pointers.

INDIRECT

____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

INSERTION

The JFIF ____ format has a hexadecimal value of FFD8 FFE0 in the first four bytes.

JPEG

The term ____ is often used when discussing Linux because technically, Linux is only the core of the OS.

KERNEL

Many password-protected OSs and applications store passwords in the form of ____ or SHA hash values.

MD5

Records in the MFT are called ____.

Metadata

____ was introduced when Microsoft created Windows NT and is still the main file system in Windows 10.

NTFS

With ____, Macintosh moved to the Intel processor and became UNIX based.

OSX

The primary hash algorithm used by the NSRL project is ____.

SHA-1

WinHex provides several hashing algorithms, such as MD5 and ____.

SHA-1

____ is a data-hiding technique that uses host files to cover the contents of a secret message.

STEGANOGRAPHY

____ steganography replaces bits of the host file with other bits of data.

SUBSITUTUON

____ increases the time and resources needed to extract, analyze, and present evidence.

Scope creep

All disks have more storage capacity than the manufacturer states.

TRUE

Alternate data streams can obscure valuable evidentiary data, intentionally or by coincidence.

TRUE

Although a disk editor gives you the most flexibility in testing, it might not be capable of examining a compressed file's contents.

TRUE

Computers used several OSs before Windows and MS-DOS dominated the market.

TRUE

Drive slack includes RAM slack (found mainly in older Microsoft OSs) and file slack.

TRUE

For target drives, use only recently wiped media that have been reformatted and inspected for computer viruses.

TRUE

If a file contains information, it always occupies at least one allocation block.

TRUE

In Microsoft file structures, sectors are grouped to form clusters, which are storage allocation units of one or more sectors.

TRUE

It's possible to create a partition, add data to it, and then remove references to the partition so that it can be hidden in Windows.

TRUE

One way to examine a partition's physical level is to use a disk editor, such as WinHex, or Hex Workshop.

TRUE

Some encryption schemes are so complex that the time to crack them can be measured in days, weeks, years, and even decades.

TRUE

The defense request for full discovery of digital evidence applies only to criminal cases in the United States.

TRUE

The most common computer-related crime is check fraud.

TRUE

The two major forms of steganography are insertion and substitution.

TRUE

The type of file system an OS uses determines how data is stored on the disk.

TRUE

To help determine which computer forensics tool to purchase, a comparison table of functions, subfunctions, and vendor products is useful.

TRUE

When you research for computer forensics tools, strive for versatile, flexible, and robust tools that provide technical support.

TRUE

To help determine which computer forensics tool to purchase, a comparison table of functions, subfunctions, and vendor products is useful.

True

When seizing computer evidence in criminal investigations, follow the ____ standards for seizing digital data.

US DOJ

Many vendors have developed write-blocking devices that connect to a computer through FireWire,____ 2.0 and 3.0, SATA, PATA, and SCSI controllers.

USB

A ____ enables you to run another OS on an existing physical computer (known as the host computer) by emulating a computer's hardware environment.

VIRTUAL MACHINE

____ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.

Vector graphics

____ can be software or hardware and are used to protect evidence disks by preventing data from being written to them.

WRITE-BLOCKERS

The data-hiding technique ____ changes data from readable code to data that looks like binary executable code.

bit-shifting

____ images store graphics information as grids of pixels.

bitmap

Recovering fragments of a file is called ____.

carving

Confidential business data included with the criminal evidence are referred to as ____ data.

commingled

The raw data format, typically created with the Linux ____ command, is a simple bit-for-bit copy of a data file, a disk partition, or an entire drive.

dd

____ contain instructions for the OS for hardware devices, such as the keyboard, mouse, and video card, and are stored in the systemroot\Windows\System32\Drivers folder.

device drivers

In Windows 2000 and later, the ____ command shows you the file owner if you have multiple users on the system or network.

dir

One way to compare results and verify your a new tool is by using a ____, such as HexWorkshop, or WinHex.

disk editor

Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminated without a proper shutdown.

event log

The early standard Linux file system was ____.

ext2

Corporate investigators always have the authority to seize all computer equipment during a corporate investigation.

false

ISPs can investigate computer abuse committed by their customers.

false

In macOS volume fragmentation is kept to a minimum by removing clumps from larger files.

false

Operating systems do not have tools for recovering image files.

false

The first 5 bytes (characters) for all MFT records are FILE.

false

The validation function is the most challenging of all tasks for computer investigators to master.

false

When viewing two files that look the same, but one has an invisible digital watermark, they appear to be the same file, except for their sizes.

false

You use ____ to create, modify, and save bitmap, vector, and metafile graphics.

graphics editor

Data ____ involves changing or manipulating a file to conceal information.

hiding

Software forensics tools are commonly used to copy data from a suspect's disk drive to a(n) ____.

image file

In a files's inode, the first 10 pointers are called ____ pointers.

indirect

With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.

initial-response field kit

____ contain file and directory metadata and provide a mechanism for linking data stored in data blocks.

inodes

____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

insertion

In macOS, volumes have allocation blocks and ____ blocks.

logical

____ compression compresses data by permanently discarding bits of information in the file.

lossy

Investigating and controlling computer incident scenes in private-sector environments is ____ in crime scenes.

much easier than

The ____ publishes articles, provides tools, and creates procedures for testing and validating computer forensics software.

nist

Courts consider evidence data in a computer as ____ evidence.

physical

A forensics workstation consisting of a laptop computer with almost as many bays and peripherals as a stationary workstation is also known as a ____.

portable workstation

____ is the standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest.

probable cause

Every business or organization must have a well-defined process describing when an investigation can be initiated. At a minimum, most company policies require that employers have a ____ that a law or policy is being violated.

reasonable suspicion

To complete a forensic disk analysis and examination, you need to create a ____.

report

In macOS, when you're working with an application file, the ____ fork contains additional information, such as menus, dialog boxes, icons, executable code, and controls.

resource

____ alters hash values, which makes cracking passwords more difficult.

salting passwords

One technique for extracting evidence from large systems is called ____.

sparse aquisistion

____ is defined as hiding messages in such a way that only the intended recipient knows the message is there.

steganography

In civil and criminal cases, the scope is often defined by search warrants or ____, which specify what data you can recover.

subpoenas

A judge can exclude evidence obtained from a poorly worded warrant.

true

Bitmap images are collections of dots, or pixels, in a grid format that form a graphic.

true

Drive slack includes RAM slack (found mainly in older Microsoft OSs) and file slack.

true

For target drives, use only recently wiped media that have been reformatted and inspected for computer viruses.

true

If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner, employees have an expectation of privacy.

true

If a file contains information, it always occupies at least one allocation block.

true

If a graphics file is fragmented across areas on a disk, you must recover all the fragments before re-creating the file.

true

If you follow police instructions to gather additional evidence without a search warrant after you have reported the crime, you run the risk of becoming an agent of law enforcement.

true

It's possible to create a partition, add data to it, and then remove references to the partition so that it can be hidden in Windows.

true

Private-sector cases, such as employee abuse investigations, might not specify limitations in recovering data.

true

Several password-cracking tools are available for handling password-protected data or systems.

true

Software forensic tools are grouped into command-line applications and GUI applications.

true

The reason for the standard practice of securing an incident or crime scene is to expand the area of control beyond the scene's immediate location.

true

The type of file system an OS uses determines how data is stored on the disk.

true

Under copyright laws, maps and architectural plans may be registered as pictorial, graphic, and sculptural works.

true

With many computer forensics tools, you can open files with external viewers.

true

Criminal investigations are limited to finding data defined in the search ____.

warrant

During an investigation involving a live computer, do not cut electrical power to the running system unless it's an older ____ or MS-DOS system.

windows


Conjuntos de estudio relacionados

Copyright Laws and Regulations Vocabulary

View Set

Texas Principles of Real Estate 2: Chapter 2 Quiz

View Set

intro to marketing exam 1 questions

View Set

Health & Accident Insurance Exam - XCEL Solutions

View Set