Chapter 10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

_____ is not a server needed for delivery on the Internet: An E-mail Client An MX server An SMTP A domain

An E-mail Client

Which of the following refers to the study of creating machines that have the ability to think at a level equal to a human being? Li-Fi Emerging Intelligence Artificial Intelligence Machine Vision

Artificial Intelligence

Which of the following is not an EnCase certification track? CFCE EnCE CFSR EnCEP

CFCE

A computer forensic expert's analysis should be all of these things EXCEPT: Impartial Cursory Accurate Documented

Cursory

Forensic investigators benefit from using Li-Fi in their operations because it is more secure than Wi-Fi. In what way is Li-Fi more secure than Wi-Fi? Since Li-Fi uses visible light to transmit data, a malicious actor must be able to directly view the data in order to see what is being transmitted. Li-Fi is not more secure than Wi-Fi. Data traveling through Li-Fi is not broadcast to the surrounding area and is only confined to its transmission route. As such, it is harder for a malicious actor to access this data. Data traveling through Li-Fi can only be accessed if you know the username and password.

Data traveling through Li-Fi is not broadcast to the surrounding area and is only confined to its transmission route. As such, it is harder for a malicious actor to access this data.

Examples of digital forensic tools include _____. Windows 10, Incase, Disk Investigator and ComputerCOP ComputerCUP, Encase, Risk Investigator, and Digital Detective ComputerCUP, Encase, Disk Investigator and Digital Detective Disk Investigator, Digital Detective, EnCase and ComputerCOP

Disk Investigator, Digital Detective, EnCase and ComputerCOP

This stage of the digital forensics process touches all other stages in the process: Documentation Communication Collection Presentation

Documentation

From the given options, which is the cause of the renewed challenges facing security practitioners today? The digital forensics market increasing from $3 billion to $7 billion. Earth's population growth and rise in the number of people using digital devices The development of SSDs for the storage of digital evidence. Using data tapes instead of flash drives to store digital evidence.

Earth's population growth and rise in the number of people using digital devices

Which of the following best describes Guaranteed Recovery, a useful feature found in Disk Drill? It creates a copy of any deleted files and saves it to a user-specified folder. It performs periodic backups of a computer's hard drive to prevent data loss. It ensures that a computer's recovery software is operating properly. It prevents a computer's user from deleting any files from the machine.

It creates a copy of any deleted files and saves it to a user-specified folder.

How does computer forensics differ from traditional forensics? It is focused solely on proving innocence. It is focused solely on digital evidence. It is focused solely on helping gain a conviction. It is focused solely on mobile devices.

It is focused solely on digital evidence.

Which of the following best defines machine vision? It is the use of computers to scan digital evidence so that investigators may determine the motive for a crime. It is when a robot with A.I. is given the ability to see. It is the use of computers to perform facial recognition scanning. It refers to the use of visible light to aid in wireless communications.

It is the use of computers to perform facial recognition scanning.

Which of the following best describes a proactive approach to digital crime? It requires that network administrators look through network logs to determine what caused a cyber attack. It involves preventing a network service from functioning normally. It refers to actively searching for the clues that typically precede an attack in an effort to prevent the crime from taking place. It involves investigating the cause of an attack after it has occurred.

It refers to actively searching for the clues that typically precede an attack in an effort to prevent the crime from taking place.

Which of the following best describes what data recovery is? It is when an external hard drive or a flash drive is used to backup data to prevent loss. It refers to when data is purposely or accidentally deleted. It refers to the act of recovering data which has been lost, corrupted, or deleted. It requires the use of a Linux-based machine in order to retrieve files which have been misplaced in a computer.

It refers to the act of recovering data which has been lost, corrupted, or deleted.

What is one difference between how data was stored in the 90s and early 2000s to how it is stored now? It was common for data in the 90s and early 2000s to be stored on tapes, whereas today you are more likely to store data on different media, such as SSDs and flash drives. Today, it is necessary to store data only on the host computer because an SSD or flash drive containing evidence may become lost. Data in the 90s and early 2000s was commonly stored on SSDs, but today it is common to store data on flash drives. It wasn't necessary to store data on external media during the 90s and 2000s because it could be stored directly on the host device.

It was common for data in the 90s and early 2000s to be stored on tapes, whereas today you are more likely to store data on different media, such as SSDs and flash drives.

Which of these might represent what the analysis stage of the digital forensics process entails? Writing down the chain of custody. Making conclusions about data. Gathering work and home computers. Handling evidence with gloves.

Making conclusions about data.

Which of the following is characterized by a hacker's ability to intercept the communications between two devices? Reactive malware Denial-of-service Man-in-the-middle Proactive attacks

Man-in-the-middle

The collection part of the computer forensic expert's job includes all of the following EXCEPT: Acquiring physical components for searching. Using resources and tools to find hidden information. Gathering data embedded in computers. Penning a written report of digital data.

Penning a written report of digital data.

Which of the following involves a malicious actor sending fraudulent emails appearing to come from a trusted source in an effort to obtain confidential information from people? Zero-Day Man-in-the-Middle Phishing Denial-of-Service

Phishing

Which of the following approach refers to the method of handling the occurrence of a digital crime after it has already happened? Reactive approach Proactive approach Deactivate approach Phishing

Reactive approach

An email can be faked using _____. POP client or SMTP server IMAP server or Website mailer SMTP server or Website mailer Website mailer or E-mail client application

SMTP server or Website mailer

Which of the following data recovery tools utilizes a system's command prompt in order to operate? Guaranteed Recovery Disk Drill EaseUS TestDisk

TestDisk

What is a limitation of EaseUS? It can only be run through a system's command prompt and the user must have administrative privileges. It can only recover data which was lost due to user error. The free version of EaseUS data recovery tool only allows you to scan for lost and deleted files. In order to fully recover the data for use, you would need to purchase the full version. It cannot recover data that was lost due to a hard drive being reformatted.

The free version of EaseUS data recovery tool only allows you to scan for lost and deleted files. In order to fully recover the data for use, you would need to purchase the full version.

Which of these is a common tactic investigators use to preserve data during the digital forensics process? They make copies of files or images. They ask the suspect for more proof. They tell others what they found. They post about it on Facebook.

They make copies of files or images.

Which file types does Disk Drill struggle to recover? Video and audio files Photos Documents Files with the .txt extension

Video and audio files

Computer forensic experts work with two primary types of data. What are they? Digital and physical. Visible and latent. Quantitative and qualitative. Mobile and internet.

Visible and latent.

Which of these is a component of the presentation portion of computer forensics? Providing data for scholastic journals. Writing a comprehensive report of findings. Uncovering latent pieces of digital data. Presenting devices to investigators for gathering data.

Writing a comprehensive report of findings.

Which of the following attacks involves cyber criminals exploiting vulnerabilities that are not yet known to the general public and which do not have any defenses implemented yet? Phishing Zero-Day Denial-of-Service Man-in-the-Middle

Zero-Day

ComputerCOP is particularly designed to address _____. sheriffs, chiefs, and district attorneys forensic skills directories viewing mode violation on systems internet fraud child safety on the internet

child safety on the internet

Missteps made in the _____ process can cause valuable evidence to be discarded or thrown out of court. collection determination personalization analysis

collection

Before you can collect evidence in the digital forensics process, you must first work to _____ potential relevant sources. disregard analyze identify control

identify

Digital Detective tool offers experts _____. no certification track DD certification DD Certification for cybersecurity CFSR (Certified Forensic Security Responder)

no certification track

The key factor that enables fake emails is _____. the ability for impostors to deliver mails by altering the sender's email information to whatever they want the ability for impostors to deliver mails by altering the sender's DNS information to whatever they want the ability for impostors to deliver mails by altering the recipient's email information to whatever they want the ability for impostors to deliver mails by altering the recipient's DNS information to whatever they want

the ability for impostors to deliver mails by altering the sender's email information to whatever they want

Digital Forensics entails _____. undeleting and recovering lost files accessing the system's directories viewing mode and navigating through the various systems files and folders the identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices identifying and solving computer crimes

the identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

E-Mail spoofing is defined as _____. the process of manipulating the contents of an email in a way that makes the email appear to originate from a source other than the actual sender the process of intercepting an email and altering its contents the process of cloning a recipients email client posing as someone else the process of deliberately altering the path of an email to obstruct it delivery

the process of manipulating the contents of an email in a way that makes the email appear to originate from a source other than the actual sender

The main difference between the POP and IMAP e-mail protocols is that _____. with POP emails can be accessed from any device anywhere while with IMAP emails are only accessed from the download device POP sends and receives messages over the internet While IMAP maps the recipients domain using DNS with POP emails are only accessed from the download device while with IMAP emails can be accessed from any device anywhere with POP a master copy of the email is kept on the email client for access anywhere while with IMAP no master copy exists

with POP emails are only accessed from the download device while with IMAP emails can be accessed from any device anywhere


Ensembles d'études connexes

Marketing Research Exam 1 Summary Review

View Set

CAN'T HURT ME - By David Goggins

View Set

Ch.28 The Aggregate Expenditures Model

View Set

PHSC 101 Exam 1: Chapter 1 and 2 Exam

View Set

BUSI331 Read & Interact: Hair, Ortinau, & Harrison: Chapter 13

View Set