Computer Forensics Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Each graphics file type has a unique header value.

T

ISO standard 27037 sta tes that the most important factors in data acquisition are the DEFR's competency and the use of validated tools.

T

The first 3 bytes of an XIF file are exactly the same as a TIF file.

T

The only pieces of metadata not in an inode are the filename and path.

T

Which of the following is not considered to be a non-standard graphics file format? a. .dxf b. .tga c. .rtl d. .psd

a. .dxf

What is the goal of the NSRL project, created by NIST a. Collect known hash values for commercial software and OS files using SHA hashes. b. Search for collisions in hash values, and contribute to fixing hashing programs. c. Create hash values for illegal files and distribute the information to law enforcement. d. Collect known hash values for commercial software and OS files using MD5 hashes.

a. Collect known hash values for commercial software and OS files using SHA hashes.

What hex value is the standard indicator for jpeg graphics files a. FF D8 b. FF D9 c. F8 D8 d. AB CD

a. FF D8

The __________ Linux Live CD includes tools such as Autopsy and Sleuth Kit, ophcrack, dcfldd, MemFetch, and MBoxGrep, and utilizes a KDE interface. a. Kali b. Arch c. Ubuntu d. Helix3

a. Kali

A hash that begins with "$6" in the shadow file indicates that it is a hash from what hashing algorithm a. MD5 b. Blowfish c. SHA-1 d. SHA-512

a. MD5

What is the purpose of the reconstruction function in a forensics investigation a. Re-create a suspect's drive to show what happened during a crime or incident. b. Prove that two sets of data are identical. c. Copy all information from a suspect's drive, including information that may have been hidden. d. Generate reports or logs that detail the processes undertaken by a forensics investigator.

a. Re-create a suspect's drive to show what happened during a crime or incident.

What does the MFT header field at offset 0x00 contain? a. The MFT record identifier FILE b. The size of the MFT record c. The length of the header d. The update sequence array

a. The MFT record identifier FILE

What type of block does a UNIX/Linux computer only have one of a. boot block b. data block c. inode block d. superblock

a. boot block

Reconstructing fragments of files that have been deleted from a suspect drive, is known as ____________ in North America. a. carving b. scraping c. salvaging d. sculpting

a. carving

The ___________ command inserts a HEX E5 (0xE5) in a filename's first letter position in the associated directory entry. a. delete b. edit c. update d. clear

a. delete

Which of the following commands creates an alternate data stream? a. echo text > myfile.txt:stream_name b. ads create myfile.txt{stream_name} "text" c. cat text myfile.txt=stream_name d. echo text

a. echo text > myfile.txt:stream_name

The ______________ command can be used to see network interfaces. a. ifconfig b. ipconfig c. show interfaces d. show ip brief

a. ifconfig

What command below will create a symbolic link to a file a. ln -s b. ls -ia c. ln -l d. ls -h

a. ln -s

Which of the following options is not a subfunction of extraction a. logical data copy b. decrypting c. bookmarking d. carving

a. logical data copy

What kind of graphics file combines bitmap and vector graphics types? a. metafile b. bitmap c. jpeg d. tif

a. metafile

Where is the root user's home directory located on a Mac OS X file system? a. /root b. /private/var/root c. /private/spool/root d. /home/root

b. /private/var/root

As part of a forensics investigation, you need to recover the logon and logoff history information on a Linux based OS. Where can this information be found? a. /var/log/utmp b. /var/log/wtmp c. /var/log/userlog d. /var/log/system.log

b. /var/log/wtmp

What hexadecimal code below identifies an NTFS file system in the partition table? a. 05 b. 07 c. 1B d. A5

b. 07

A Master Boot Record (MBR) partition table marks the first partition starting at what offset? a. 0x1CE b. 0x1BE c. 0x1AE d. 0x1DE

b. 0x1BE

How many bits are required to create a pixel capable of displaying 65,536 different colors? a. 8 bits b. 16 bits c. 32 bits d. 64 bits

b. 16 bits

What act defines precisely how copyright laws pertain to graphics? a. 1988 Image Ownership Act b. 1976 Copyright Act c. 1923 Patented Image Act d. 1976 Computer Fraud and Abuse Act

b. 1976 Copyright Act

Within the /etc/shadow file, what field contains the password hash for a user account if one exists? a. 1st field b. 2nd field c. 3rd field d. 4th field

b. 2nd field

A typical disk drive stores how many bytes in a single sector? a. 8 b. 512 c. 1024 d. 4096

b. 512

What is the minimum size of a block in UNIX/Linux filesystems a. 128 bytes b. 512 bytes c. 1024 bits d. 2048 bits

b. 512 bytes

In general, what would a lightweight forensics workstation consist of? a. A tablet with peripherals and forensics apps b. A laptop computer built into a carrying case with a small selection of peripheral options c. A laptop computer with almost as many bays and peripherals as a tower d. A tower with several bays and many peripheral devices

b. A laptop computer built into a carrying case with a small selection of peripheral options

What program serves as the GUI front end for accessing Sleuth Kit's tools a. DetectiveGUI b. Autopsy c. KDE d. SMART

b. Autopsy

The ReFS storage engine uses a __________ sort method for fast access to large data sets. a. A+-tree b. B+-tree c. reverse d. numerical

b. B+-tree

Which of the following is stated within the ISO 27037 standard a. Hardware acquisition tools can only use CRC-32 hashing. b. Digital Evidence First Responders should use validated tools. c. Software forensics tools must provide a GUI interface. d. Software forensics tools must use the Windows OS.

b. Digital Evidence First Responders should use validated tools.

For EXIF JPEG files, the hexadecimal value starting at offset 2 is _____________. a. FFE0 b. FFE1 c. FFD8 d. FFD9

b. FFE1

What tool below was written for MS-DOS and was commonly used for manual digital investigations a. SMART b. Norton DiskEdit c. ByteBack d. DataLifter

b. Norton DiskEdit

If a file has 510 bytes of data, what is byte 510? a. The physical EOF. b. The logical EOF. c. The terminating EOF. d. The end of the sector.

b. The logical EOF.

When using the File Allocation Table (FAT), where is the FAT database typically written to? a. The innermost track b. The outermost track c. The first sector d. The first partition

b. The outermost track

_______________ proves that two sets of data are identical by calculating hash values or using another similar method. a. Verification b. Validation c. Integration d. Compilation

b. Validation

What file type starts at offset 0 with a hexidecimal value of FFD8 a. tiff b. jpeg c. xdg d. bmp

b. jpeg

Addresses that allow the MFT to link to nonresident files are known as _______________. a. virtual cluster numbers b. logical cluster numbers c. sequential cluster numbers d. polarity cluster numbers

b. logical cluster numbers

The Lempel-Ziv-Welch (LZW) algorithm is used in _____________ compression. a. lossy b. lossless c. vector quantization d. adaptive

b. lossless

Passwords are typically stored as one-way _____________ rather than in plaintext. a. hex values b. variables c. hashes d. slack spaces

b. variables

What metadata record in the MFT keeps track of previous transactions to assist in recovery after a system failure in an NTFS volume? a. $MftMirr b. $TransAct c. $LogFile d. $Backup

c. $LogFile

How many different colors can be displayed by a 24 bit colored pixel a. 256 b. 65,536 c. 16,777,216 d. 4,294,967,296

c. 16,777,216

All TIF files start at offset 0 with what 6 hexadecimal characters? a. 2A 49 48 b. FF 26 9B c. 49 49 2A d. AC 49 2A

c. 49 49 2A

Which graphics file format below is rarely compressed a. GIF b. JPEG c. BMP d. None of the above

c. BMP

What option below is an example of a platform specific encryption tool a. GnuPG b. TrueCrypt c. BitLocker d. Pretty Good Privacy (PGP)

c. BitLocker

For all JPEG files, the ending hexadecimal marker, also known as the end of image (EOI), is ____________. a. FFE0 b. FFD8 c. FFD9 d. FFFF

c. FFD9

On Mac OS X systems, what utility can be used to encrypt / decrypt a user's home directory a. Disk Utility b. BitLocker c. FileVault d. iCrypt

c. FileVault

________________ contain file and directory metadata and provide a mechanism for linking data stored in data blocks. a. Blocks b. Clusters c. Inodes d. Plist files

c. Inodes

Who is the current maintainer of the Linux kernel a. Tim Cook b. Eric Shmidt c. Linus Torvalds d. Lennart Poettering

c. Linus Torvalds

What registry file contains user account management and security settings a. Default.dat b. Software.dat c. SAM.dat d. Ntuser.dat

c. SAM.dat

In what mode do most write-blockers run a. RW mode b. BIOS mode c. Shell mode d. GUI mode

c. Shell mode

What registry file contains installed programs' settings and associated usernames and passwords? a. Default.dat b. Security.dat c. Software.dat d. System.dat

c. Software.dat

In simple terms, _____________ compression discards bits in much the same way rounding off decimal values discards numbers. a. Huffman b. Lempel-Ziv-Welch (LZW) c. Vector Quantization d. Adaptive Quantization

c. Vector Quantization

Most manufacturers use what technique in order to deal with the fact that a platter's inner tracks have a smaller circumference than the outer tracks? a. Disk Track Recording (DTR) b. Zone Based Areal Density (ZBAD) c. Zone Bit Recording (ZBR) d. Cylindrical Head Calculation (CHC)

c. Zone Bit Recording (ZBR)

Select below the command that can be used to display bad block information on a Linux file system, but also has the capability to destroy valuable information. a. dd b. fdisk c. badblocks d. mke2fs

c. badblocks

The Mac OS reduces file fragmentation by using _______________. a. inodes b. superblocks c. clumps d. chunks

c. clumps

What term below describes a column of tracks on two or more disk platters a. sector b. cluster c. cylinder d. header

c. cylinder

The process of converting raw picture data to another format is called _________________. a. splicing b. carving c. demosaicing d. vector quantization

c. demosaicing

What command below can be used to decrypt EFS files? a. cipher b. copy c. efsrecvr d. decrypt

c. efsrecvr

Select below the file system that was developed for mobile personal storage devices, such as flash memory devices, secure digital eXtended capacity (SDCX), and memory sticks: a. FAT12 b. FAT32 c. exFAT d. VFAT

c. exFAT

What format was developed as a standard for storing metadata in image files? a. jpeg b. tif c. exif d. bitmap

c. exif

A keyword search is part of the analysis process within what forensic function? a. reporting b. reconstruction c. extraction d. acquisition

c. extraction

What term is used to describe a disk's logical structure of platters, tracks, and sectors? a. cylinder b. trigonometry c. geometry d. mapping

c. geometry

The _________ branches in HKEY_LOCAL_MACHINE\Software consist of SAM, Security, Components, and System. a. registry b. storage c. hive d. tree

c. hive

In a B*-tree file system, what node stores link information to previous and next nodes? a. inode b. header node c. index node d. map node

c. index node

When looking at a byte of information in binary, such as 11101100, what is the first bit on the left referred to as a. major significant bit (MSB) b. least significant bit (LSB) c. most significant bit (MSB) d. leading significant bit (LSB)

c. most significant bit (MSB)

What file under the /etc folder contains the hashed passwords for a local system a. passwd b. hashes c. shadow d. users

c. shadow

Adding the _____________ flag to the ls -l command has the effect of of showing all files beginning with the "." character in addition to other files. a. -s b. -d c. -l d. -a

d. -a

The ProDiscover utility makes use of the proprietary __________ file format. a. .img b. .pro c. .iso d. .eve

d. .eve

The _____________ format is a proprietary format used by Adobe Photoshop. a. .tga b. .fh11 c. .svg d. .psd

d. .psd

________________ is a specialized carving tool that can read many image file formats, such as RAW and Expert Witness. a. AccessData FTK b. X-Ways Forensics c. Guidance Software EnCase d. Foremost

d. Foremost

What algorithm is used to decompress Windows files a. Fibonacci b. Zopfli c. Shannon-Fano d. Lempel-Ziv

d. Lempel-Ziv

Select below the utility that is not a lossless compression utility: a. PKZip b. WinZip c. StuffIt d. Lzip

d. Lzip

What information below is not included within an inode a. The mode and type of the file or directory b. The number of links to a file or directory c. The file's or directory's last access time and last modified time d. The file's or directory's path

d. The file's or directory's path

What third party encryption tool creates a virtual encrypted volume, which is a file mounted as though it were a disk drive a. PGP Full Disk Encryption b. Voltage SecureFile c. BestCrypt d. TrueCrypt

d. TrueCrypt

Which of the following is not a valid configuration of Unicode? a. UTF-8 b. UTF-16 c. UTF-32 d. UTF-64

d. UTF-64

The physical data copy subfunction exists under the ______________ function. a. reporting b. validation / verification c. extraction d. acquisition

d. acquisition

When performing disk acquisition, the raw data format is typically created with the UNIX/Linux _____________ command. a. format b. tar c. dump d. dd

d. dd

What file is used to store any file information that is not in the MDB or a VCB? a. page file b. metadata database file c. slack file d. extents overflow file

d. extents overflow file

In what temporary location below might passwords be stored a. system32.dll b. CD-ROM drive c. Windows registry d. pagefile.sys

d. pagefile.sys

Which of the following is not a type of graphic file that is created by a graphics program? a. bitmap images b. vector graphics c. metafile graphics d. raster graphics

d. raster graphics

Referred to as a digital negative, the _______ is typically used on many higher-end digital cameras. a. raster file format b. bitmap file format c. jpeg file format d. raw file format

d. raw file format

Which of the following formats is not considered to be a standard graphics file format? a. gif b. jpeg c. dxf d. tga

d. tga

Each MFT record starts with a header identifying it as a resident or nonresident attribute.

F

FAT32 is used on older Microsoft OSs, such as MS-DOS 3.0 through 6.22, Windows 95 (first release), and Windows NT 3.3 and 4.0.

F

In UNIX and Linux, everything except monitors are considered files.

F

Making a logical acquisition of a drive with whole disk encryption can result in unreadable files.

F

Physically copying the entire drive is the only type of data-copying method used in software acquisitions.

F

Someone who wants to hide data can create hidden partitions or voids- large unused gaps between partitions on a disk drive. Data that is hidden in partition gaps cannot be retrieved by forensics utilities.

F


Ensembles d'études connexes

Chapter 7 Psychology Terms (Thought, Language and Intelligence)

View Set

OFFICIAL SEAL OF THE PROFESSIONAL REGULATORY BOARD OF REAL ESTATE SERVICES (PRBRES)

View Set

Trad Exam Practice for Proctor Exam

View Set

Algorithms are Instructions #26-34 & Algorithms and Problem-Solving #1-16

View Set

Eating Disorders, Somatoform Disorders, and Factitious

View Set