cyb 365 Fall final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Ext4 can support disk partitions as large as ____ TB.

16

By the end of 2008, mobile phones had gone through three generations: analog, digital personal communications service (PCS), and ____.

3G

In an e-mail address, everything after the ____ symbol represents the domain name.

@

____ images store graphics information as grids of pixels.

Bitmap

Recovering fragments of a file is called ____.

Carving

The ____ is an organization that has developed resource documentation for CSPs and their staff. It provides guidance for privacy agreements, security measures, questionnaires, and more.

Cloud Security Alliance

In macOS, the ____ fork typically contains data the user creates.

Data

The ____ is where directories and files are stored on a disk drive.

Data block

In a files's inode, the first 10 pointers are called ____ pointers.

Direct

Typically, phones store system data in ____, which enables service providers to reprogram phones without having to access memory chips physically.

EEPROM

The early standard Linux file system was ____.

Ext2

All e-mail servers use databases that store multiple users' e-mails. T/F

False

Cloud forensics is not considered a subset of network forensics T/F

False

E-mail crimes and violations rarely depend on the city, state, and country in which the e-mail originated. T/F

False

Investigating smartphones and other mobile devices is a relatively easy task in digital forensics. T/F

False

Mac OS file systems have four descriptors for the end of a file (EOF).

False

Operating systems do not have tools for recovering image files.

False

RGB Value (255,255,255) yields Green color T/F

False

Steganography cannot be used with file formats other than image files.

False

With respect to CSP's, Guidelines are detailed rules for a CSP's internal operation T/F

False

With respect to CSP's, Standards are detailed documents that define workflow and step-by-step instructions for CSP staff T/F

False

____ components define the file system on UNIX/Linux.

Five

If you can't open a graphics file in an image viewer, the next step is to examine the file's ____.

Header data

_____________ deployment method enables a company to keep some information private and designate other files as public or community information.

Hybrid

____ contain file and directory metadata and provide a mechanism for linking data stored in data blocks.

Inodes

____ steganography adds data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

Insertion

The JFIF ____ format has a hexadecimal value of FFD8 FFE0 in the first four bytes.

Jpeg

In macOS, volumes have allocation blocks and ____ blocks.

Logical

____ compression compresses data by permanently discarding bits of information in the file.

Lossy

In macOS, when you're working with an application file, the ____ fork contains additional information, such as menus, dialog boxes, icons, executable code, and controls.

Resource

In older versions of macOS, a file consists of two parts: a data fork, where data is stored, and a ____ fork, where file metadata and application information are stored.

Resource

____ cards are usually found in GSM devices and consist of a microprocessor and internal memory.

Sim

Within which service model are "Applications are delivered via the Internet"?

Software as a service (SaaS)

Steganalysis tools are also called ____.

Steg tools

____ is a data-hiding technique that uses host files to cover the contents of a secret message.

Steganography

____ steganography replaces bits of the host file with other bits of data.

Substitution

Because bring your own device (BYOD) has become a business standard, investigators must consider how to keep employees' personal data separate from case evidence. T/F

True

Before OS X, the Hierarchical File System (HFS) was used, in which files are stored in directories (folders) that can be nested in other directories. T/F

True

Bitmap images are collections of dots, or pixels, in a grid format that form a graphic. T/F

True

Cloud service agreements (CSAs) are also known as service legal agreements (SLAs) T/F

True

Cloud service agreements (CSAs) is a contract between a CSP and the customer that describes what services are being provided and at what level T/F

True

E-mail programs either save e-mail messages on the client computer or leave them on the server. T/F

True

Ext3 is a journaling version of Ext2 that has a built-in file recovery mechanism used after a crash T/F

True

Faraday bag can be utilized to isolate a mobile device from incoming signals. T/F

True

For digital investigators, tracking intranet e-mail is easier because accounts use standard names the administrator establishes. T/F

True

If a graphics file is fragmented across areas on a disk, you must recover all the fragments before re-creating the file. T/F

True

Most CSPs keep data storage locations secret for security reasons T/F

True

Pixel color is often expressed as an RGB (red-green-blue) T/F

True

Portability of information is what makes SIM cards so versatile. T/F

True

The number of devices connected to the internet is expected to reach 50 billion in the next few decades T/F

True

The two major forms of steganography are insertion and substitution. T/F

True

You can send and receive e-mail in two environments: via the Internet or an intranet (an internal network). T/F

True

Cellebrite includes ____, a mobile forensics tool that's often used by law enforcement and the military.

UFED Reader

____ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.

Vector graphics

Which of the following is NOT a service level for the cloud?

Virtualization as a service

E-mail messages are distributed from a central server to many connected client computers, a configuration called ____.

client/server architecture

The process of converting raw picture data to another format is referred to as ____.

demosaicing

The simplest way to access a file header is to use a(n) ____ editor

hexadecimal

Some e-mail systems store messages in flat plaintext files, known as a(n) ____ format.

mbox

To retrieve e-mail headers in Microsoft Outlook, double-click the e-mail message, and then click File, ____. The "Internet headers" text box at the bottom of the dialog box contains the message header.

properties

After you open e-mail headers, copy and paste them into a text document so that you can read them with a text editor, such as Windows ____.

Notepad +

With ____, Macintosh moved to the Intel processor and became UNIX based.

OS X

For personal use, ____ have been replaced by iPods, iPads, and other mobile devices.

PDAs


Set pelajaran terkait

Anatomy & Physiology II: Heart and Cardiovascular System

View Set

Chapter 19 regulation of gene expression in eukaryotes

View Set

Ch. 14: Nutrition for Childbearing (6%)

View Set