Forensic Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Can only be accessed by people who have the necessary credentials.

Private Cloud

WinHex provides several hashing algorithms, such as MD5 and ____. a) SHA-1 b) RC4 c) CRC d) AES

a) SHA-1

Most remote acquisitions have to be done as ____ acquisitions. a) live b) static c) sparse d) hot

a) live

A ____ plan specifies how to rebuild a forensic workstation after it has been severely contaminated by a virus from a drive you're analyzing. a) risk management b) configuration management c) disaster recovery d) security

c) disaster recovery

It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant. a) litigation b) prosecution c) exhibits d) reports

c) exhibits

The software that runs virtual machines is called a ____. a) host b) computer c) hypervisor d) server

c) hypervisor

Which of the following is not one of the five mechanisms the government can use to get electronic information from a provider? a) subpoenas b) search warrants c) seizure order d) court orders

c) seizure order

Most packet analyzers operate on layer 2 or ____ of the OSI model. a) 5 b) 1 c) 7 d) 3

d) 3

With many ____ e-mail programs, you can copy an e-mail message by dragging the message to a storage medium, such as a folder or drive. a) prompt-based b) shell-based c) command-line d) GUI

d) GUI

Which of the following is NOT a component of Ext 4? a) super block b) boot block c) inode block d) Resource block

d) Resource block

The files that provide helpful information to an e-mail investigation are log files and ____ files. a) scripts b) .rts c) batch d) configuration

d) configuration

A ____ is written by a judge to compel someone to do or not do something, such as a CSP producing user logon activities. a) temporary restraining order b) warrant c) subpoena d) court order

d) court order

A ____ is a column of tracks on two or more disk platters. a) track b) head c) sector d) cylinder

d) cylinder

In macOS, the ____ fork typically contains data the user creates. a) resource b) content c) user d) data

d) data

A ____ enables you to run another OS on an existing physical computer (known as the host computer) by emulating a computer's hardware environment. a) virtual file b) logic machine c) logic drive d) virtual machine

d) virtual machine

Remote acquisitions are often easier because you're usually dealing with large volumes of data. a) False b) True

a) False

Similar to Linux, Windows also has built-in hashing algorithm tools for digital forensics. a) False b) True

a) False

____ often work as part of a team to secure an organization's computers and networks. a) Forensics investigators b) Network monitors c) Computer analysts d) Data recovery engineers

a) Forensics investigators

Google doc is an example of ______. a) Software as a Service b) Platform as a Service c) Infrastructure as a Service d) Security as a Service

a) Software as a Service

Specially trained system and network administrators are often a CSP's first responders. a) True b) False

a) True

Courts consider evidence data in a computer as ____ evidence. a) physical b) invalid c) virtual d) logical

a) physical

Whether you're serving as an expert witness or a fact witness, be professional and polite when presenting yourself to any attorney or the court. a) False b) True

b) True

If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a) live b) local c) static d) passive

a) live

____ trains people to listen to voice recordings to determine who's speaking or read e-mail and other writings known to be by a certain person and determine whether that person wrote the e-mail or letter in question. a) Email trafficking b) Communication forensics c) Forensic linguistics d) Email forensics

c) Forensic linguistics

____ contain file and directory metadata and provide a mechanism for linking data stored in data blocks. a) Extnodes b) Xnodes c) Inodes d) InfNodes

c) Inodes

____ hide the most valuable data at the innermost part of the network. a) Protocols b) Firewalls c) Layered network defense strategies d) NAT

c) Layered network defense strategies

To view Gmail Web e-mail headers open the e-mail, click the down arrow next to the Reply circular arrow, and click ____. a) Message properties b) Options c) Show original d) More options

c) Show original

In a file's inode, the first 10 pointers are called ____ pointers. a) indirect b) double c) direct d) triple

c) direct

One technique for extracting evidence from large systems is called ____. a) RAID imaging b) RAID copy c) large evidence file recovery d) sparse acquisition

d) sparse acquisition

Enables a company to keep some information private and designate other files as public or community information.

Hybrid Cloud

The current file system for Linux is _____. a) Ext 4 b) APFS c) NTFS

a) Ext 4

The file or folder's MFT record provides cluster addresses where the file is stored on the drive's partition. These cluster addresses are called ____. a) metaruns b) virtual runs c) metada d) data runs

d) data runs

The term ____ is often used when discussing Linux because technically, Linux is only the core of the OS. a) module b) GRUB c) root d) kernel

d) kernel

A way to bring people together for a specific purpose, for example, to access common files.

Community Cloud

A cloud service that's available to the general public.

Public Cloud

In an e-mail address, everything after the ____ symbol represents the domain name. a) @ b) # c) . d) -

a) @

All Unix-like operating systems have a kernel. a) True b) False

a) True

Alternate data streams can obscure valuable evidentiary data, intentionally or by coincidence. a) True b) False

a) True

E-mail programs either save e-mail messages on the client computer or leave them on the server. a) True b) False

a) True

If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner, employees have an expectation of privacy. a) True b) False

a) True

If a file contains information, it always occupies at least one allocation block. a) True b) False

a) True

Some acquisition tools don't copy data in the host protected area (HPA) of a disk drive. a) True b) False

a) True

Some cases involve dangerous settings. For these types of investigations, you must rely on the skills of hazardous materials (HAZMAT) teams to recover evidence from the scene. a) True b) False

a) True

The Fourth Amendment to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure. a) True b) False

a) True

The chain of custody of evidence supports the integrity of your evidence. a) True b) False

a) True

The platform as a service cloud service is most likely found on a desktop or a server, although it could also be found on a company network or the remote service provider's infrastructure. a) True b) False

a) True

The type of file system an OS uses determines how data is stored on the disk. a) True b) False

a) True

There are inherent conflicts between the goals of attorneys and the goals of scientists or technicians (experts). a) True b) False

a) True

To be a successful computer forensics investigator, you must be familiar with more than one computing platform. a) True b) False

a) True

Unix and Linux commands are case sensitive. a) True b) False

a) True

You can send and receive e-mail in two environments: via the Internet or an intranet (an internal network). a) True b) False

a) True

____ hypervisors are typically, but not exclusively, loaded on servers or workstations with a lot of RAM and storage. a) Type 1 b) Type 2 c) Type 3 d) Type 4

a) Type 1

In Exchange, to prevent loss of data from the last backup, a ____ file or marker is inserted in the transaction log to mark the last point at which the database was written to disk. a) checkpoint b) temporary c) milestone d) tracking

a) checkpoint

The ____ is where directories and files are stored on a disk drive. a) data block b) inode block c) superblock d) boot block

a) data block

One way to hide partitions is with the Windows disk partition utility, ____. a) diskpart b) System Commander c) PartitionMagic d) Norton DiskEdit

a) diskpart

Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure. a) key escrow b) key splitting c) steganography d) password backup

a) key escrow

Published company policies provide a(n) ____ for a business to conduct internal investigations. a) line of authority b) litigation path c) allegation resource d) line of allegation

a) line of authority

Records in the MFT are called ____. a) metadata b) hyperdata c) inodes d) infodata

a) metadata

Investigating and controlling computer incident scenes in private-sector environments is ____ in crime scenes. a) much easier than b) more difficult than c) as difficult as d) as easy as

a) much easier than

The purpose of the ____ is to provide a mechanism for recovering files encrypted with EFS if there's a problem with the user's original private key. a) recovery certificate b) certificate escrow c) root certificate d) administrator certificate

a) recovery certificate

The most important laws applying to attorneys and witnesses are the ____. a) rules of evidence b) rules of ethics c) professional codes of conduct d) professional ethics

a) rules of evidence

Leading questions such as "Isn't it true that forensics experts always destroy their handwritten notes?" are referred to as ____ questions. a) setup b) attorney c) nested d) hypothetical

a) setup

With cloud systems running in a virtual environment, ____ can give you valuable information before, during, and after an incident. a) snapshots b) carving c) RAM d) live acquisition

a) snapshots

Exchange logs information about changes to its data in a(n) ____ log. a) transaction b) checkpoint c) tracking d) communication

a) transaction

Law enforcement investigators need a(n) ____ to remove computers from a crime scene and transport them to a lab. a) warrant b) evidence custody form c) FOIA form d) affidavit

a) warrant

When the hard link count drops to ____, the file is effectively deleted. a) -1 b) 0 c) 1 d) 2

b) 0

For forensics examiner, keeping the ____ updated and complete is crucial to supporting your role as an expert and showing that you're constantly enhancing your skills through training, teaching, and experience. a) testimony b) CV c) examination plan d) deposition

b) CV

____ is an attempt by opposing attorneys to prevent you from serving on an important case. a) Deposition b) Conflicting out c) Warrant d) Conflict of interest

b) Conflicting out

Which is NOT one of the triad that makes up computer security? a) Digital investigations b) Data recovery c) Vulnerability assessment and risk management d) Network intrusion detection and incident response

b) Data recovery

As an expert witness, you can't testify if you weren't present when the event occurred. a) True b) False

b) False

Computer investigations and forensics fall into the same category: public investigations. a) True b) False

b) False

ISPs can investigate computer abuse committed by their customers. a) True b) False

b) False

If damage occurs to the floor, walls, ceilings, or furniture on your computer forensics lab, it does not need to be repaired immediately. a) True b) False

b) False

Maintaining credibility means you must form and sustain unbiased opinions of your cases. a) True b) False

b) False

The law requires search warrants to contain specific descriptions of what's to be seized. For cloud environments, the property to be seized usually describes physical hardware rather than data, unless the CSP is a suspect. a) True b) False

b) False

When an investigator finds a mix of information, judges often issue a limiting phrase to the warrant, which allows the police present all evidence together. a) True b) False

b) False

Data ____ involves changing or manipulating a file to conceal information. a) Creep b) Hiding c) Integrity d) Recovery

b) Hiding

The ____ Project was developed to make information widely available in an attempt to thwart Internet and network hackers. a) Honeypot b) Honeynet c) Honeyweb d) Honeywall

b) Honeynet

To enhance searching for and eliminating known OS and application files, Autopsy has an indexed version of the NIST ____ of MD5 hashes. a) NRP b) NSRL c) UFSL d) YAFF

b) NSRL

____ was introduced when Microsoft created Windows NT and is still the main file system in Windows 10. a) FAT32 b) NTFS c) VFAT d) HPFS

b) NTFS

____ determines how long a piece of information lasts on a system. a) Liveness b) Order of volatility c) Continuity level d) Longevity

b) Order of volatility

____ increases the time and resources needed to extract, analyze, and present evidence. a) Court order for discovery b) Scope creep c) Litigation path d) Investigation plan

b) Scope creep

Computing systems in a forensics lab should be able to process typical cases in a timely manner. a) False b) True

b) True

Drive slack includes RAM slack (found mainly in older Microsoft OSs) and file slack. a) False b) True

b) True

For digital investigators, tracking intranet e-mail is easier because accounts use standard names the administrator establishes. a) False b) True

b) True

In Microsoft file structures, sectors are grouped to form clusters, which are storage allocation units of one or more sectors. a) False b) True

b) True

In the United States, there's no state or national licensing body for digital forensics examiners. a) False b) True

b) True

It's possible to create a partition, add data to it, and then remove references to the partition so that it can be hidden in Windows. a) False b) True

b) True

People need ethics to help maintain their balance, especially in difficult and contentious situations. a) False b) True

b) True

The most common and time-consuming technique for preserving evidence is creating a duplicate copy of your disk-to-image file. a) False b) True

b) True

Which of the following is NOT a service level for the cloud? a) Platform as a service b) Virtualization as a service c) Software as a service d) Infrastructure as a service

b) Virtualization as a service

Generally, digital records are considered admissible if they qualify as a ____ record. a) computer-stored b) business c) hearsay d) computer-generated

b) business

E-mail messages are distributed from a central server to many connected client computers, a configuration called ____. a) peer-to-peer architecture b) client/server architecture c) central distribution architecture d) client architecture

b) client/server architecture

A ____ is where you conduct your investigations, store evidence, and do most of your work. a) storage room b) digital forensics lab c) workbench d) forensic workstation

b) digital forensics lab

A(n) ____ should include all the tools you can afford to take to the field. a) forensic workstation b) extensive-response field kit c) forensic lab d) initial-response field kit

b) extensive-response field kit

If your time is limited, consider using a logical acquisition or ____ acquisition data copy method. a) lossless b) sparse c) disk-to-image d) disk-to-disk

b) sparse

A ____ usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will. a) line of authority b) warning banner c) right banner d) right of privacy

b) warning banner

____ refers to the number of bits in one square inch of a disk platter. a) Head skew b) ZBR c) Areal density d) Cylinder skew

c) Areal density

____ records are data the system maintains, such as system log files and proxy server logs. a) Hearsay b) Business c) Computer-generated d) Computer-stored

c) Computer-generated

____ involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash, for example. a) Computer forensics b) Network forensics c) Data recovery d) Disaster recovery

c) Data recovery

____ is the standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest. a) A warrant b) Reasonable cause c) Probable cause d) A subpoena

c) Probable cause

____ involves determining how much risk is acceptable for any process or operation, such as replacing equipment. a) Risk configuration b) Configuration management c) Risk management d) Change management

c) Risk management

In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____. a) blotter b) exhibit report c) affidavit d) litigation report

c) affidavit

When you give ____ testimony, you present this evidence and explain what it is and how it was obtained. a) lay witness b) expert c) technical/scientific d) deposition

c) technical/scientific

____ is a way to verify the names of domains a message is flowing through. a) www.google.com b) www.juno.com c) www.dkim.org d) www.whatis.com

c) www.dkim.org

Forensics examiners have two roles: fact witness and ____ witness. a) discovery b) professional c) direct d) expert

d) expert

In macOS, volumes have allocation blocks and ____ blocks. a) master b) clumped c) clustered d) logical

d) logical

One major disadvantage of ____ format acquisitions is the inability to share an image between different vendors' computer forensics analysis tools. a) AFF b) raw c) AFD d) proprietary

d) proprietary

In general, a criminal case follows three stages: the complaint, the investigation, and the ____. a) litigation b) blotter c) allegation d) prosecution

d) prosecution


Conjuntos de estudio relacionados

Management of Patients with Oncology Disorder

View Set

Preparation/Obtaining a Search Warrant

View Set

ГЛАВА 31 Патофізіологія серця

View Set

Extra help with Cancer Cells module

View Set