475 Final (Chapters 6-14)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

FFD9

For all JPEG files, the ending hexadecimal marker, also known as the end of image (EOI), is ____________.​

16,777,216

How many different colors can be displayed by a 24 bit colored pixel?​

the logical EOF

If a file has 510 bytes of data, what is byte 510?​

6

In VirtualBox, ____________ different types of virtual network adapters are possible, such as AMD and Intel Pro adapters.​

​Get-VMNetworkAdapter

In Windows, what PowerShell cmdlet can be used in conjunction with Get-VM​ to display a virtual machine's network adapters?

index node

In a B*-tree file system, what node stores link information to previous and next nodes?​

SYN flood

In a __________ attack, the attacker keeps asking your server to establish a connection, with the intent of overloading a server with established connections.​

d

In general, what would a lightweight forensics workstation consist of?​ a. ​A tablet with peripherals and forensics apps b. ​A laptop computer with almost as many bays and peripherals as a tower c. ​A tower with several bays and many peripheral devices d. ​A laptop computer built into a carrying case with a small selection of peripheral options

​Vector Quantization

In simple terms, _____________ compression ​discards bits in much the same way rounding off decimal values discards numbers.

shell mode

In what mode do most write-blockers run?​

pagefile.sys

In what temporary location below might passwords be stored? ​

key escrow

Many commercial encryption programs use a technology called _____________, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.​

Known File Filter (KFF)

The AccessData program has a hashing database, ________________, which is available only with FTK, and can be used to filter known program files from view and contains the hash values of known illegal files.​

lossless

The Lempel-Ziv-Welch (LZW) algorithm is used in _____________ compression.​

clumps

The Mac OS reduces file fragmentation by using _______________.

Kali

The __________ Linux Live CD includes tools such as Autopsy and Sleuth Kit, ophcrack, ​dcfldd, MemFetch, and MBoxGrep, and utilizes a KDE interface.​

ifconfig

The ______________ command can be used to see network interfaces.​

National Software Reference Library

The _______________________ maintains a national database of updated file hash values for a variety of OSs, applications, and images, but does not list hash values of known illegal files.​

scope creep

The goal of recovering as much information as possible can result in ________________, in which an investigation expands beyond the original description because of unexpected evidence found.​

acquistition

The physical data copy subfunction exists under the ______________ function.​

demosaicing

The process of converting raw picture data to another format is called _________________.​

steganalysis

The term for detecting and analyzing steganography files is _________________.​

bit shifting

Typically, anti-virus tools run hashes on potential malware files, but some advanced malware uses ________________ as a way to hide its malicious code from antivirus tools.​

BMP

Which graphics file format below is rarely compressed?

XFS

Which of the following file systems can't be analyzed by OSForensics?

raster graphics

Which of the following is not a type of graphic file that is created by a graphics program?​

.dxf

Which of the following is not considered to be a non-standard graphics file format?​

d

Which of the following is stated within the ISO 27037 standard?​ a. ​Software forensics tools must use the Windows OS. b. ​Hardware acquisition tools can only use CRC-32 hashing. c. ​Software forensics tools must provide a GUI interface. d. ​Digital Evidence First Responders should use validated tools.

logical data copy

Which of the following options is not a subfunction of extraction?​

HexEdit

Which option below is not a disk management tool?​

brute force attack

Which password recovery method uses every possible letter, number, and character found on a keyboard?​

Linus Torvalds

Who is the current maintainer of the Linux kernel?​

2nd field

Within the /etc/shadow file, what field contains the password hash for a user account if one exists?​

verification

_______________ proves that two sets of data are identical by calculating hash values or using another similar method.​

Foremost

________________ is a specialized carving tool that can read many image file formats, such as RAW and Expert Witness.​

FFE1

​For EXIF JPEG files, the hexadecimal value starting at offset 2 is _____________.

16 bits

​How many bits are required to create a pixel capable of displaying 65,536 different colors?

diskpart

​In Windows, the ______________ command can be used to both hide and reveal partitions within Explorer.

keylogger

​In order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely.

FAT

​In which file system can you hide data by placing sensitive or incriminating data in free or slack space on disk partition clusters?

FileVault

​On Mac OS X systems, what utility can be used to encrypt / decrypt a user's home directory?

OSForensics

​Select the tool below that does not use dictionary attacks or brute force attacks to crack passwords:

.eve

​The ProDiscover utility makes use of the proprietary _______________ file format.

.psd

​The _____________ format is a proprietary format used by Adobe Photoshop.

tcpdump

​The _______________ command line program is a common way of examining network traffic, which provides records of network activity while it is running, and produce hundreds or thousands of records.

Lempel Ziv

​What algorithm is used to decompress Windows files?

ln -s

​What command below will create a symbolic link to a file?

.exif

​What format was developed as a standard for storing metadata in image files?

a

​What is the purpose of the reconstruction function in a forensics investigation? a. ​Re-create a suspect's drive to show what happened during a crime or incident. b. ​Copy all information from a suspect's drive, including information that may have been hidden. c. ​Prove that two sets of data are identical. d. ​Generate reports or logs that detail the processes undertaken by a forensics investigator.

dd

​When performing disk acquisition, the raw data format is typically created with the UNIX/Linux _____________ command.

tga

​Which of the following formats is not considered to be a standard graphics file format?

128

​Within Windows Vista and later, partition gaps are _____________ bytes in length.

inodes

​________________ contain file and directory metadata and provide a mechanism for linking data stored in data blocks.

Oracle VirtualBox

Select below the option that is not a common type 1 hypervisor:​

Lzip

Select below the utility that is not a lossless compression utility:​

dd

A ____________ image file containing software is intended to be bit-stream copied to floppy disks or other external media.​

MD5

A hash that begins with "$6" in the shadow file indicates that it is a hash from what hashing algorithm? ​

extraction

A keyword search is part of the ​analysis process within what forensic function?

macro

A user with programming experience may use an assembler program (also called a __________ ) on a file to scramble bits, in order to secure the information contained inside.​

-a

Adding the _____________ flag to the ​ls -l command has the effect of of showing all files beginning with the "." character in addition to other files.

49 49 2A

All TIF files start at offset 0 with what 6 hexadecimal characters?​

/var/log/wtmp

As part of a forensics investigation, you need to recover the logon and logoff history information on a Linux based OS. Where can this information be found?​

Layer 2 or 3

At what layers of the OSI model do most packet analyzers function?​

File manipulation (file name and extension, hidden property) Encryption (bit shifting, steganography) Disk manipulation (hidden partition, bad cluster)

Participation please list the three main aspects for data hiding. For each aspect, please give at least two aspects or example.

data compression - coding of data from larger to smaller form lossless - reduces file size without removing data lossy - permanently discards bits of information

Participation What is data compression and the two kind of compression

command line forensics tools UNIX/Linux forensics tools GUI tools

Participation 3 kinds of Forensics Software Tools

repair image headers reconstruct fragmented image files while carving

Participation Explain how to repair an image

BlackBag Technologies Guidance EnCase X-Ways Forensics

Participation List at least 3 examples of Mac forensics software

return path recipient's e-mail address type of sending e-mail service IP address of sending server name of the e-mail server unique message number date and time e-mail was sent attachment files information

Participation Please explain how to exam E-mail headers

systematic tracking of incoming and outgoing traffic intruders leave trail behind determine the cause of the abnormal traffic

Participation Please explain what is network forensics

Computer Forensics Tool Testing (CFTT) program National Software Reference Library (NSRL) project using validation protocols

Participation Please list at least three main ways for evaluating the forensics tools

BitPalm AccessData FTK Imager MacLockPick 3.0

Participation Please list the main tools for mobile forensics (at least 3)

key escrow cracking password persuade suspect to reveal password

Participation Please list the thee methods for examining encrypted files

bitmap images vector graphics metafile graphics

Participation Please list the three main Graphics File Formats

boot block superblock inode block data block

Participation What are the four blocks component in UNIX

abstract table of contents body of report conclusion references glossary acknowledgements appendixes

Participation What is the report structure

variables

Passwords are typically stored as one-way _____________ rather than in plaintext.​

/etc/sendmail.cf /etc/syslog.conf /var/log/maillog

Please explain how to exam UNIX e-mail server logs

carving

Reconstructing fragments of files that have been deleted from a suspect drive, is known as ____________ in North America.​

raw file format

Referred to as a digital negative, the _______ is typically used on many higher-end digital cameras.​

badblocks

Select below the command that can be used to display bad block information on a Linux file system, but also has the capability to destroy valuable information.​

1976 Copyright Act

What act defines precisely how copyright laws pertain to graphics?

extents overflow file

What file is used to store any file information that is not in the MDB or a VCB?​

jpeg

What file type starts at offset 0 with a hexidecimal value of FFD8?​

shadow

What file under the /etc folder contains the hashed passwords for a local system?​

.vmdk

What format below is used for VMware images?

FF D8

What hex value is the standard indicator for jpeg graphics files?​

the file's or directory's path

What information below is not included within an inode?​

b

What is the goal of the NSRL project, created by NIST?​ a. ​Search for collisions in hash values, and contribute to fixing hashing programs. b. ​Collect known hash values for commercial software and OS files using SHA hashes. c. ​Create hash values for illegal files and distribute the information to law enforcement. d. ​Collect known hash values for commercial software and OS files using MD5 hashes.

512 bytes

What is the minimum size of a block in UNIX/Linux filesystems?​

metafile

What kind of graphics file combines bitmap and vector graphics types?​

B

What letter should be typed into DiskEdit in order to mark a good sector as bad?​

BitLocker

What option below is an example of a platform specific encryption tool?

Autopsy

What program serves as the GUI front end for accessing Sleuth Kit's tools?​

salted passwords

What technique is designed to reduce or eliminate the possibility of a rainbow table being used to discover passwords?​

Norton DiskEdit

What tool below was written for MS-DOS and was commonly used for manual digital investigations?​

boot block

What type of block does a UNIX/Linux computer only have one of?​

most significant bit (MSB)

When looking at a byte of information in binary, such as 11101100, what is the first bit on the left referred to as?​

The hard drive should be removed, if practical, and the system's date and time values should be recorded from the system's CMOS.​

When performing a static acquisition, what should be done after the hardware on a suspect's computer has been inventoried and documented?​

/private/var/root

Where is the root user's home directory located on a Mac OS X file system?​


Set pelajaran terkait

PEC Chapter 6 - Special Equipment

View Set

Documents that influenced the writing of the Constitution of the United States of America, Fundamental Principles - CE 2A-C

View Set

Ch. 18 Maintaining Server Installations

View Set

WATER CYCLE 4th Grade a. Plan and carry out investigations to observe the flow of energy in water as it changes states from solid (ice) to liquid (water) to gas (water vapor) and changes from gas to liquid to solid. Sources: Ed. Galaxy, HSP textbook, GPS

View Set