cyb 365 Fall final
Ext4 can support disk partitions as large as ____ TB.
16
By the end of 2008, mobile phones had gone through three generations: analog, digital personal communications service (PCS), and ____.
3G
In an e-mail address, everything after the ____ symbol represents the domain name.
@
____ images store graphics information as grids of pixels.
Bitmap
Recovering fragments of a file is called ____.
Carving
The ____ is an organization that has developed resource documentation for CSPs and their staff. It provides guidance for privacy agreements, security measures, questionnaires, and more.
Cloud Security Alliance
In macOS, the ____ fork typically contains data the user creates.
Data
The ____ is where directories and files are stored on a disk drive.
Data block
In a files's inode, the first 10 pointers are called ____ pointers.
Direct
Typically, phones store system data in ____, which enables service providers to reprogram phones without having to access memory chips physically.
EEPROM
The early standard Linux file system was ____.
Ext2
All e-mail servers use databases that store multiple users' e-mails. T/F
False
Cloud forensics is not considered a subset of network forensics T/F
False
E-mail crimes and violations rarely depend on the city, state, and country in which the e-mail originated. T/F
False
Investigating smartphones and other mobile devices is a relatively easy task in digital forensics. T/F
False
Mac OS file systems have four descriptors for the end of a file (EOF).
False
Operating systems do not have tools for recovering image files.
False
RGB Value (255,255,255) yields Green color T/F
False
Steganography cannot be used with file formats other than image files.
False
With respect to CSP's, Guidelines are detailed rules for a CSP's internal operation T/F
False
With respect to CSP's, Standards are detailed documents that define workflow and step-by-step instructions for CSP staff T/F
False
____ components define the file system on UNIX/Linux.
Five
If you can't open a graphics file in an image viewer, the next step is to examine the file's ____.
Header data
_____________ deployment method enables a company to keep some information private and designate other files as public or community information.
Hybrid
____ contain file and directory metadata and provide a mechanism for linking data stored in data blocks.
Inodes
____ steganography adds data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.
Insertion
The JFIF ____ format has a hexadecimal value of FFD8 FFE0 in the first four bytes.
Jpeg
In macOS, volumes have allocation blocks and ____ blocks.
Logical
____ compression compresses data by permanently discarding bits of information in the file.
Lossy
In macOS, when you're working with an application file, the ____ fork contains additional information, such as menus, dialog boxes, icons, executable code, and controls.
Resource
In older versions of macOS, a file consists of two parts: a data fork, where data is stored, and a ____ fork, where file metadata and application information are stored.
Resource
____ cards are usually found in GSM devices and consist of a microprocessor and internal memory.
Sim
Within which service model are "Applications are delivered via the Internet"?
Software as a service (SaaS)
Steganalysis tools are also called ____.
Steg tools
____ is a data-hiding technique that uses host files to cover the contents of a secret message.
Steganography
____ steganography replaces bits of the host file with other bits of data.
Substitution
Because bring your own device (BYOD) has become a business standard, investigators must consider how to keep employees' personal data separate from case evidence. T/F
True
Before OS X, the Hierarchical File System (HFS) was used, in which files are stored in directories (folders) that can be nested in other directories. T/F
True
Bitmap images are collections of dots, or pixels, in a grid format that form a graphic. T/F
True
Cloud service agreements (CSAs) are also known as service legal agreements (SLAs) T/F
True
Cloud service agreements (CSAs) is a contract between a CSP and the customer that describes what services are being provided and at what level T/F
True
E-mail programs either save e-mail messages on the client computer or leave them on the server. T/F
True
Ext3 is a journaling version of Ext2 that has a built-in file recovery mechanism used after a crash T/F
True
Faraday bag can be utilized to isolate a mobile device from incoming signals. T/F
True
For digital investigators, tracking intranet e-mail is easier because accounts use standard names the administrator establishes. T/F
True
If a graphics file is fragmented across areas on a disk, you must recover all the fragments before re-creating the file. T/F
True
Most CSPs keep data storage locations secret for security reasons T/F
True
Pixel color is often expressed as an RGB (red-green-blue) T/F
True
Portability of information is what makes SIM cards so versatile. T/F
True
The number of devices connected to the internet is expected to reach 50 billion in the next few decades T/F
True
The two major forms of steganography are insertion and substitution. T/F
True
You can send and receive e-mail in two environments: via the Internet or an intranet (an internal network). T/F
True
Cellebrite includes ____, a mobile forensics tool that's often used by law enforcement and the military.
UFED Reader
____ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.
Vector graphics
Which of the following is NOT a service level for the cloud?
Virtualization as a service
E-mail messages are distributed from a central server to many connected client computers, a configuration called ____.
client/server architecture
The process of converting raw picture data to another format is referred to as ____.
demosaicing
The simplest way to access a file header is to use a(n) ____ editor
hexadecimal
Some e-mail systems store messages in flat plaintext files, known as a(n) ____ format.
mbox
To retrieve e-mail headers in Microsoft Outlook, double-click the e-mail message, and then click File, ____. The "Internet headers" text box at the bottom of the dialog box contains the message header.
properties
After you open e-mail headers, copy and paste them into a text document so that you can read them with a text editor, such as Windows ____.
Notepad +
With ____, Macintosh moved to the Intel processor and became UNIX based.
OS X
For personal use, ____ have been replaced by iPods, iPads, and other mobile devices.
PDAs
