FS2 Exam 2 Study Guide

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In Linux, in which directory are most system configuration files stored? /home /dev /var /etc

/etc

On a Linux computer, by what are file systems exported to remote hosts represented? /etc/fstab /var/run/utmp /ver/log/wtmp /etc/exports

/etc/exports

In Linux, in which directory are most applications and commands stored? /home /etc /var /usr

/usr

At what hard link count is a file effectively deleted? 0 1 -1 2

0

What is the largest disk partition Ext4f can support? 4 TB 16 TB 10 TB 8 TB

16 TB

What do you call a forensics workstation consisting of a laptop computer with almost as many bays and peripherals as a stationary workstation? A portable workstation A field workstation A quasi-workstation A lightweight workstation

A portable workstation

In which format are most digital photographs stored? TIFF EXIF GIF PNG

EXIF

Which tool allows network traffic to be viewed graphically? Etherape Tcpdump john Ethereal

Etherape

Which acronym refers to the file structure database that Microsoft originally designed for floppy disks? VFAT FAT32 NTFS FAT

FAT

All TIF files start at position zero (offset 0 is the first byte of a file) with hexadecimal 49 49 3B. True False

False

Because there are a number of different versions of UNIX and Linux, these OSs are referred to CLI platforms. True False

False

In software acquisition, there are three types of data-copying methods. True False

False

Most organizations keep e-mail for longer than 90 days. True False

False

Operating systems do not have tools for recovering image files. True False

False

The HFS and HFS+ file systems have four descriptors for the end of a file (EOF). True False

False

Type 1 hypervisors are useally the ones you find loaded on a suspect machine. True False

False

Typically, a virtual machine consists of just one file. True False

False

When intruders break into a network, they rarely leave a trail behind. True False

False

macOS is built with the new Apple File System (APFS). The current version offers better security, encryption, and performance speeds, but users can't mount HFS+ drives. True False

False

Which JFIF format has a hexadecimal value of FFD8 FFE0 in the first four bytes? JPEG EPS BMP GIF

JPEG

Which term is often used when discussing Linux because technically, Linux is only the core of the OS? Module Root Kernel GRUB

Kernel

In older versions of macOS, in which fork are file metadata and application information stored? Resource Inode Node Block

Resource

What is the primary hash algorithm used by the NIST project created to collect all known hash valuse for commercial software and OS files? SHA-1 MD5 CRC-32 RC4

SHA-1

Which hashing algorithm is provided by WinHex? CRC RC4 SHA-1 AES

SHA-1

What tyoe of disk is commonly used with Sun Solaris systems? FIRE IDE F.R.E.D. SPARC DiskSpy

SPARC

What technique has been used to protect copyrighted material by inserting digital watermarks into a file? Encryption Steganography Archiving Compression

Steganography

Which term comes from the Greek word for "hidden writing"? Lexicography Hagiography Cryptography Steganography

Steganography

Which term refers to a data-hiding technique that uses host files to cover the contents of a secret message? Graphie Steganalysis Steganos Steganography

Steganography

In addition to search warrants, what defines the scope of civil and criminal cases? Investigator preferences Risk assessment reports Subpoenas Lab policies and procedures

Subpoenas

From which file format is the image format XIF derived? TIF JPEG GIF BMP

TIF

Which digital forensics tool is categorized as a single-purpose hardware component? Magnet Forensics AXIOM AccessData FTK Tableau T35es-R2-SATA/IDE eSATA bridge Safeback

Tableau T35es-R2-SATA/IDE eSATA bridge

In older versions of macOS, where is all information about the volume stored? The Volume Bitmap (VB) The Extents Overflow File (EOF) The Volume Control Block (VCB) The Master Directory Block (MDB)

The Master Directory Block (MDB)

What macOS system application tracks each block on a volume to determine which blocks are in use and which ones are available to receive data? The Volume Control Block The Master Directory Block The Volume Bitmap Then Extents Overflow File

The Volume Bitmap

Where are directories and files stored on a disk drive? The boot block The inode block The data block The superblock

The data block

In macOS, which fork typically contains data the user creates? The resource fork The data fork The user fork The content fork

The data fork

When Microsoft created Windows 95, into what were initialization (.ini) files consolidated? The inirecord The inidata The registry The metadata

The registry

Although a disk editor gives you the most flexibility in testing, it might not be capable of examining a compressed file's contents. True False

True

Before OS X, the Hierarchical File System (HFS) was used, in which files are stored in directories (folders) that can be nested in other directories. True False

True

Bitmap images are collections of dots, or pixels, in a grid format that form a graphic. True False

True

Computers used several OSs before Windows and MS-DOS dominated the market. True False

True

If a graphics file is fragmented across areas on a disk, you must recover all the fragments before re-creating the file. True False

True

In network forensics, you have to restore the drive to see how malware that attackers have installed on the system works. True False

True

Network logs record traffic in and out of a network. True False

True

Private-sector cases, such as employee abuse investigations, might not specify limitations in recovering data. True False

True

Software forensic tools are grouped into command-line applications and GUI applications. True False

True

Some notable UNIX distributions included Silicon Graphics, Inc. (SGI) IRIX, Santa Cruz Operation (SCO) UnixWare, Sun Solaris, IBM AIX, and HP-UX. True False

True

The Internet is the best source for learning more about file formats and their extensions. True False

True

The type of file system an OS uses determines how data is stored on the disk. True False

True

Virtual machines are now common for both personal and business use. True False

True

What kinds of images are bases on mathemeatical instructions that define lines, curves, text, ovals, and other geometric shapes? Vector graphics Line-art images Metafile graphics Bitmap images

Vector graphics

Which product responded to the need for security and preformance by producing different CPU designs? Parallels Virtualization Virtualization Technology (VT) KVM Hyper-V

Virtualization Technology (VT)

What is the general term for software or hardwarre that is used to protect evidence disks by preventing data from being written to them? Drive-protectors Data-protectors Write-blockers Disk-blockers

Write-blockers

Which header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C 01 00 00 20 65 58 74 65 6E 64 65 64 20 03? TIFF GIF XIF JPEG

XIF

What term is used for the machines used in a DDoS attack? Pawns Zombies Dupes Soldiers

Zombies

Building your own forensics workstation: is inappropriate in the private sector. is always less expensive than choosing a vendor-supplied workstation. limits you to only one peripheral device per CPU because of potential conflicts. requires the time and skills necessary to support the chosen hardware.

requires the time and skills necessary to support the chosen hardware.

Where do software forensics tool copy data from a suspect's disk drive? Firmware A recovery copy An image file A backup file

An image file

Which tool probes, collects, and analyzes session data? TCPcap Argus Nmap Pcap

Argus

Which program incorporates an advanced encryption technique that can be used to hide data? NTI BestCrypt FTK PRTK

BestCrypt

What type of attacks use every possible letter, number, and character found on a keyboard when cracking a password? Brute-force Statistics Profile Dictionary

Brute-force

Because digital forensics tools have limitations in performing hashing, what tools should be used to ensure data integrity? Steganalysis tools High-level language assemblers HTML editors Hexadecimal editors

Hexadecimal editors

Which standards document demands accuracy for all aspects of the testing process? ISO 5725 ISO 5321 ISO 17025 ISO 3657

ISO 5725

What does scope creep typically do? -Virtually guarantees a conviction and substantial penalty -Increases the time and resources needed to extract, analyze, and present data -Creates overburdened staff who become careless with their work -Leads to the discovery and prosecution of other crimes

Increases the time and resources needed to extract, analyze, and present data

In a file's inode, what are the first 10 pointers called? Triple pointers Double pointers Indirect pointers Direct pointers

Indirect pointers

What contains file and directory metadata and provides a mechanism for linking data stored in data blocks? Xnodes Inodes Extnodes InfNodes

Inodes

Which type of compression compresses data permently by discarding bits of information in the file? Lossy Huffman Redundant Lossless

Lossy

Many password-protected OSs and applications stroe passwords in the form of which type of hash values? MD5 SSL AES SSH

MD5

Which tool enables the investigator to acquire the forensic image and process it in the same step? Magenet DEFR Magnet dd Magnet AXIOM Magnet FTK

Magnet AXIOM

Which tool lists all open network sockets, including those hidden by rootkits? Memoryze EnCase Knoppix R-Tools

Memoryze

Which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes its findings to Ntldr? Boot.ini Hal.dll BootSect.dos NTDetect.com

NTDetect.com

Which acronym refers to the file system that was introduced when Microsoft created Windows NT and that remains the main file system in Windows 10? HPFS FAT32 VFAT NTFS

NTFS

Which tool was designed as an easy-to-use interface for inspecting and analyzing large tcpdump files? Etherape Ethertext Tcpread Netdude

Netdude

Which type of forensics can help you determine whether a system is truely under attack or a user has inadvertently installed an untested patch or custom program? Network forensics DDoS forensics Intrusion forensics Traffic forensics

Network forensics

Which filename refers to the Windows XP system service dispatch stubs to executables functions and internal support functions? Ntdll.dll User32.dll Advapi32.dll Gdi32.dll

Ntdll.dll

Which filename refers to the physical address support program for accessing more than 4 GB of physical RAM? Hal.dll Ntkrnlpa.exe BootSect.dos lo.sys

Ntkrnlpa.exe

Macintosh moved to the Intel processor and became UNIX based with which operating system? High Sierra OS X El Capitan Lion

OS X


Kaugnay na mga set ng pag-aaral

SQL and Differrent type of SQL statements

View Set

Walking Through and Explaining a DCF; Calculating Free Cash Flow (FCF) - Breaking into Wall Street

View Set

Instruction Set: Addressing Modes and Format

View Set

Ethics-Chapter 3- Conscience and Moral Development

View Set

Praxis Practice Test Math 7803-Elementary Education

View Set