Computer Forensics Quiz 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If a hard disk is damaged and the data is deemed "lost," what is the recommended next step? A. Install the drive on a new computer as a final test. B. Create a bit-by-bit image. C. Shred the hard disk. D. Attempt a local repair.

Attempt a local repair.

______ is the basic repair tool in Windows. A. Fsck B. The TestDisk utility C. Chkdsk D. Disk Utility

Chkdsk

Which operating system commonly uses the Ext file system? A. Linux B. Mac OS C. Windows D. UNIX

Linux

The ________ and the ________ are the two NTFS files of most interest to forensics efforts. A. Master File Table (MFT), cluster bitmap B. inode, cluster bitmap C. file allocation table (FAT), inode D. file allocation table (FAT), Master File Table (MFT)

Master File Table (MFT), cluster bitmap

When performing a manual recovery on a Linux system, what is the first step to recovering manually deleted files? A. Boot into the recovery menu and select to run diagnostics. B. Log in with root. C. Install the Linux recovery toolkit. D. Move the system to single-user mode.

Move the system to single-user mode.

________ is the preferred file system of Windows 2000 and later operating systems. A. FAT32 B. FAT16 C. NTFS D. Ext3

NTFS

______ is the basic repair tool in Mac OS. A. Fsck B. The TestDisk utility C. Chkdsk D. Disk Utility

Disk Utility

You are attempting to recover deleted files from a storage device. The device's operating system uses the FAT32 file system. What is the most important advantage you have when attempting to recover specific deleted files? A. Open source tools rather than commercial tools B. Read permissions to the files C. Time; files that were deleted relatively recently are more likely to be recovered D. Commercial tools rather than open source tools

Time; files that were deleted relatively recently are more likely to be recovered

What is the purpose of overwriting data on a hard disk with random characters seven times? A. To forensically scrub a file or folder B. To test the file allocation table (FAT) update process C. To prepare to shred the hard disk D. To verify that the file is consistent and will not cause disk errors

To forensically scrub a file or folder

You are successful in recovering data files from a damaged disk. You attempt to open a few files and receive a message that the files have been corrupted. What is the best approach to take to gain access to the data? A. Perform consistency checking. B. Perform file carving. C. Perform a second recovery. D. Open the files in a text editor.

Perform file carving.

You are a forensic examiner. The logical structure of a hard disk that you are analyzing appears almost destroyed. You are not able to get the system to boot up despite your best efforts. You choose to perform a zero-knowledge analysis. Is this an appropriate choice for the next step? A. Yes. This process includes searching memory in real time, typically for working with compromised hosts or to identify system abuse. B. No. This is a file system repair technique that involves scanning a disk's logical structure and ensuring that it is consistent with its specification. It will not help in this case. C. Yes. Using this technique, the file system is rebuilt from scratch using knowledge of an undamaged file system structure. It should allow for data retrieval. D. No. This approach includes the process of searching for specific text in binary files even if the file has a reference count of zero. It does not apply in this case.

Yes. Using this technique, the file system is rebuilt from scratch using knowledge of an undamaged file system structure. It should allow for data retrieval.

Which of the following is not true of file carving? A. You can perform file carving on the NTFS and FAT32 files systems but not Ext4. B. File carving is often used to recover data from a disk where there has been some damage or where the file itself is corrupt. C. Most file carving utilities look for file headers or footers and then pull out data that is found between these two boundaries. D. File carving is a common method of data recovery, particularly when the file metadata has been damaged.

You can perform file carving on the NTFS and FAT32 files systems but not Ext4.

A symbolic link is ________ another file. A. the deletion of B. the decommissioning of C. a pointer to D. a copy of

a pointer to

A(n) __________ is a data structure in the Linux file system that stores all the information about a file except its name and actual data. A. inode B. table C. cluster D. partition

inode

Consistency checking protects against: A. improper scanning. B. disk fragmentation. C. software bugs and storage hardware design compatibilities. D. physical damage to a hard disk.

software bugs and storage hardware design compatibilities.

In FAT and NTFS file systems, a __________ is used to map files to specific clusters where they are stored on the disk. A. node B. table C. cluster D. partition

table

Paige is attempting to recover data from a failed hard disk. She removed the failed drive from the system on which it was installed and then connected it to a test system. She made the connection by simply connecting the data and power cables but did not actually install the failed drive. What step should she perform next? A. Determine whether the failed drive is recognized and can be installed as an additional disk on the test system. B. Listen to the failed drive to determine whether the internal disks are spinning. C. Install the failed drive. D. Boot the test system from its own internal drive.

Boot the test system from its own internal drive.

Darien is performing analysis on an image of a seized machine. A power outage causes the computer to power off and back on again. When he attempts to boot up the machine to continue his work, the Windows operating system begins to initialize. However, it does not proceed past the loading screen. What type of damage is likely to have occurred? A. Logical damage B. Deletion of some critical files by the chkdsk utility C. Master Boot Record virus infection D. File carving

Logical damage

Devaki is a new forensic investigator. She is examining a recently seized hard drive. She was told by the individuals who collected the device that the owner indicated that it did not work. Devaki notices some damage on the case of the hard drive, agrees that it likely does not work, and processes the disk as if it is "lost" or inaccessible. What mistake did Devaki make? A. She should have processed the disk as damaged instead of as inaccessible. B. She should have shredded the disk because it was damaged. C. She should have verified with the hard drive owner that the hard disk did not work. D. She should have fully evaluated the disk by leveraging multiple techniques to attempt to retrieve the data.

She should have fully evaluated the disk by leveraging multiple techniques to attempt to retrieve the data.

In Windows, what does the file allocation table (FAT) store? A. The mapping between files and their cluster location on the hard drive B. The list of applications installed and their corresponding files C. A view of disk overages that are available D. The data types stored on the disk

The mapping between files and their cluster location on the hard drive


Set pelajaran terkait

prep-u Chapter 39: Fluid, Electrolyte, and Acid-Base Balance

View Set

Busi 1301 Chapter 9 terms and questions.

View Set

Lincoln's Second Inaugural Address

View Set

Chapter 16 nervous system :senses

View Set

Management & Organization Ch. 12: Communication in Organization

View Set

¡™£¢∞§¶•ªº-≠œ∑´®†¥¨ˆøπ"'«åß∂ƒ©˙∆˚¬...æΩ≈ç√∫˜µ≤≥÷⁄€‹›fifl‡°·‚—±Œ„´‰ˇÁ¨ˆØ∏"'»ÅÍ ÎÏ˝ÓÔ¸˛Ç◊ı˜Â¯˘¿

View Set

Audit Chapter 13 Practice Problems

View Set

CompTIA A+ 1101 CertMaster Practice

View Set

Practical Practice: Understanding Financial Aid Packages

View Set