FINAL EXAM

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In Microsoft Exchange, which file is responsible for messages formatted with MAPI?

.edb

Which location contains configuration information for Sendmail?

/etc/sendmail.cf

In which directory do UNIX installations typically store logs?

/var/log

At what offset are the application's last access date and time located in a prefetch file?

0x90

How many years of education does the typical juror have?

12

How many roles might a forensics examiner play in a trial?

2

There are inherent conflicts between the goals of attorneys and the goals of scientists or technicians (experts).

2

How close should a microphone be to the person testifying?

6 to 8 inches

Which uppercase letter has a hexadecimal value 41?

A

What document, issued by a judge, compels the recipient to do or not do something?

A court order

Which type of tool has application programming interfaces (APIs) that allow reconfiguring a cloud on the fly and is accessed through the application's Web interface?

A management plane

A government entity must show that there is probable cause to believe the contents of a wire communication, an electronic communication, or other records are relevant to an ongoing criminal investigation to obtain which type of order?

A search warrant

Which activity involves changing or manipulating a file to conceal information?

Data hiding

Which numbering system is being used if the report writer divides material into sections and restarts numbering with each main section?

Decimal

Which network defense strategy, developed by the National Security Agency (NSA), has three modes of protection?

Defense in Depth

What is the process of converting raw picture data to another format called?

Demosaicing

What resource might attorneys use to search for information on expert witnesses?

Deposition banks

What are packet analyzers?

Devices or software placed on a network to monitor traffic

Which action isn't usually punitive, but can be embarrassing for the professional and potentially for the attorney who retained the professional?

Disqualification

Which outcome, when caused by an ethical lapse, could effectively be a death sentence for a career as an expert witness?

Disqualification

Where do phones typically store system data?

EEPROM

In which format are most digital photographs stored?

EXIF

A honeywall is a computer set up to look like any other machine on your network, but it lures the attacker to it.

FALSE

All e-mail servers use databases that store multiple users' e-mails.

FALSE

Autopsy for Windows cannot analyze data from image files from other vendors.

FALSE

Autopsy for Windows cannot perform forensics analysis on FAT file systems.

FALSE

For civil cases, including those involving digital forensics investigations, U.S. district courts consider optional that expert witnesses submit written reports.

FALSE

Gaming consoles such as the Sony PlayStation and Xbox are safe because they don't contain information hackers might try to intercept and collect.

FALSE

If you must write a preliminary report, use words such as "preliminary copy," "draft copy," or "working draft."

FALSE

Operating systems do not have tools for recovering image files.

FALSE

The decimal numbering system is frequently used when writing pleadings.

FALSE

When writing a report, use a formal, technical style.

FALSE

The data-hiding technique involving marking bad clusters is more commonly used with what type of file system?

FAT

To retrieve e-mail headers in Microsoft Outlook, what option should be clicked after the e-mail has been selected?

File, Properties

What technology is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure?

Key escrow

Which type of strategy hides the most valuable data at the innermost part of the network?

Layered network defense

How many words should an abstract contain?

Question 71 options: 150 to 200

What type of cards, consisting of a microprocessor and internal memory, are usually found in GSM devices?

SIM

In which type of attack does the attacker keep asking the server to establish a connection?

SYN flood

Leading questions such as "Isn't it true that forensics experts always destroy their handwritten notes" are referred to as what type of questions?

Setup

What technique has been used to protect copyrighted material by inserting digital watermarks into a file?

Steganography

In addition to search warrants, what defines the scope of civil and criminal cases?

Subpoenas

Which type of digital network divides a radio frequency into time slots?

TDMA

A challenge with using social media data in court is authenticating the author and the information.

TRUE

As an expert witness, you have opinions about what you have found or observed.

TRUE

Besides presenting facts, reports can communicate expert opinion.

TRUE

Bitmap images are collections of dots, or pixels, in a grid format that form a graphic.

TRUE

Experts should be paid in full for all previous work and for the anticipated time required for testimony.

TRUE

If a graphics file is fragmented across areas on a disk, you must recover all the fragments before re-creating the file.

TRUE

In the United States, the Electronic Communications Privacy Act (ECPA) describes five mechanisms the government can use to get electronic information from a provider.

TRUE

Like UNIX e-mail servers, Exchange maintains logs to track e-mail communication.

TRUE

Network logs record traffic in and out of a network.

TRUE

No single source offers a definitive code of ethics for expert witnesses, so you must draw on standards from other organizations to form your own ethical standards.

TRUE

Part of what you have to deliver to the jury is a person they can trust to help them figure out something that's beyond their expertise.

TRUE

Portability of information is what makes SIM cards so versatile.

TRUE

Research on wearable computers has been conducted at MIT labs for more than a decade, and these computers are now moving into working reality.

TRUE

Signposts assist readers in scanning the text quickly by highlighting the main points and logical development of information.

TRUE

The chain of custody of evidence supports the integrity of your evidence.

TRUE

Under copyright laws, maps and architectural plans may be registered as pictorial, graphic, and sculptural works.

TRUE

Virtual machines (VMs) help offset hardware costs for companies.

TRUE

Whether you're serving as an expert witness or a fact witness, be professional and polite when presenting yourself to any attorney or the court.

TRUE

Which network protocol analyzer can be programmed to examine TCP headers to find the SYN flag?

Tethereal

What section of a report should contain broader generalizations?

The conclusion

What section of a report should restate the objectives, aims, and key questions and summarize the findings with clear, concise statements?

The conclusion

What is the main information being sought when examining e-mail headers?

The originating e-mail's domain name or an IP address

What limits the data that can be sought in a criminal investigation?

The search warrant

In which log does Exchange log information about changes to its data?

Transaction

Which Cellebrite mobile forensics tool is often used by law enforcement and the military?

UFED Reader

How much internal memory do mobile devices have?

Up to 64 GB

To view e-mail headers on Yahoo!, what should be clicked on after "More" has been selected?

View Raw Message

In what court case did the court summarize the process of determining whether an expert should be disqualified because of previous contact with an opposing party?

Wang Laboratories, Inc. v. Toshiba Corp

Which header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C 01 00 00 20 65 58 74 65 6E 64 65 64 20 03?

XIF

What cloud service provides a freeware type 1 hypervisor used for public and private clouds?

XenServer and XenCenter Windows Management Console

What term is used for the machines used in a DDoS attack?

Zombies

Which Dropbox file stores information on shared directories associated with a Dropbox user account and file transfers between Dropbox and the client's system?

filecache.dbx

Which Google Drive file contains a detailed list of a user's cloud transactions?

sync_log.log

Which organization has developed resource documentation for cloud service providers and their staff and provides guidance for privacy agreements, security measures, and other issues?

Cloud Security Alliance

Which organization has stated that, unlike attorneys, expert witnesses do not owe a duty of loyalty to their clients?

ABA

Which document offers comprehensive guidance for psychologists, with an entire section devoted to forensics activities?

APA's Ethics Code

A written report is often submitted as what type of document?

An affidavit

Which information from Facebook simply tells you the last time a person logged on, the person's e-mail address and mobile number, and whether the account can be viewed publicly?

Basic subscriber

How can an investigator minimize any challenges an opposing attorney could make to discredit the investigator's report or testimony?

Be as thorough as possible during the forensic examination

Which data-hiding technique changes data from readable code to data that looks like binary executable code?

Bit-shifting

What type of attacks use every possible letter, number, and character found on a keyboard when cracking a password?

Brute-force

Which folder is most likely to contain Dropbox files for a specific user?

C:\Users\username\Dropbox

What technology, developed during WWII, uses the full radio spectrum to define channels and is now used in the U.S. by Sprint, U.S. Cellular, and Verizon?

CDMA

What should you use to verify evidence and thus ensure its integrity?

Hash algorithms

What should the forensics specialist keep updated and complete in order to support his or her role as an expert and document enhancement of skills through training, teaching, and experience?

His or her CV

What type of questions can give the investigator the factual structure to support and defend his or her opinion?

Hypothetical

What does scope creep typically do?

Increases the time and resources needed to extract, analyze, and present data

Which data-hiding technique places data from the secret file into the host file without displaying the secret data when the host file is viewed in its associated program?

Insertion

Which type of compression compresses data permanently by discarding bits of information in the file?

Lossy

Many password-protected OSs and applications store passwords in the form of which type of hash values?

MD5

Which forensics software tool contains a built-in write blocker?

MOBILedit

Which tool lists all open network sockets, including those hidden by rootkits?

Memoryze

Which motion provides a written list of objections to certain testimony or exhibits?

Motion in limine

In a Windows environment, what is the default storage location used by BitPim?

My Documents\BitPim

Which cloud forensics training program is limited to law enforcement personnel?

National Institute of Justice Digital Forensics Training

Which tool was designed as an easy-to-use interface for inspecting and analyzing large tcpdump files?

Netdude


Set pelajaran terkait

ARTH 2302 Chapter 15 Early Renaissance in Fifteenth-Century Italy

View Set

Test 2 Hist 207 B Chapters 19-21

View Set

Chapter 54: Caring for Clients with Breast Disorders

View Set

Med-Surg Exam 4 Learning Objectives

View Set

FAA 107 Test Area I and Regulations

View Set

ML Fundamental Questions Qualcomm

View Set

Health Science - Body Planes and Directions

View Set

Health Assessment: Nurse's Role in Health Assessment

View Set