IT 226 - FINAL EXAM

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In Microsoft Outlook, what file extension is used with saved sent, drafted, deleted, and received e-mails?

.pst

The Enhanced Data GSM Environment (EDGE) standard was developed specifically for which type of service?

3G

What document, issued by a judge, compels the recipient to do or not do something?

A court order

Which type of order requires that the government offer specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation?

A court order

What type of laws should computer investigators be especially aware of when working with image files in order to avoid infringement violations?

Copyright

Which numbering system is being used if the report writer divides material into sections and restarts numbering with each main section?

Decimal

What is the process of converting raw picture data to another format called?

Demosaicing

What resource might attorneys use to search for information on expert witnesses?

Deposition banks

What is the most important part of an investigator's testimony at a trial?

Direct examination

Anything an investigator writes down as part of examination for a report in a civil litigation case is subject to which action from the opposing attorney?

Discovery

Which type of deposition is used to give an opposing attorney the chance to conduct what amounts to a direct examination and cross-examination of a witness?

Discovery

Where do phones typically store system data?

EEPROM

In which format are most digital photographs stored?

EXIF

If a graphics file cannot be opened in an image viewer, what should the next step be?

Examining the file's header data

Forensic examiners may serve as what types of witnesses?

Fact and expert

A graphics program creates and saves one of three types of image files: bitmap, vector, or XIF

False

A search warrant can be used in any kind of case, either civil or criminal.

False

All TIF files start at position zero (offset 0 is the first byte of a file) with hexadecimal 49 49 3B.

False

As an expert witness, you can't testify if you weren't present when the event occurred.

False

Expert opinions cannot be presented without stating the underlying factual basis

False

For civil cases, including those involving digital forensics investigations, U.S. district courts consider optional that expert witnesses submit written reports.

False

In the cloud, remote acquisitions are often easier because you're usually dealing with large volumes of data.

False

Operating systems do not have tools for recovering image files

False

The law requires search warrants to contain specific descriptions of what's to be seized. For cloud environments, the property to be seized usually describes physical hardware rather than data, unless the CSP is a suspect.

False

To retrieve e-mail headers in Microsoft Outlook, what option should be clicked after the e-mail has been selected?

File, Properties

Which JFIF format has a hexadecimal value of FFD8 FFE0 in the first four bytes?

JPEG

Which files provide helpful information to an e-mail investigation?

Log and configuration files

What files, created by Microsoft, contain the DLL pathnames and metadata used by applications and reduce the time it takes to start applications?

Prefetch

What are the most important laws applying to attorneys and witnesses?

Rules of evidence

What type of cards, consisting of a microprocessor and internal memory, are usually found in GSM devices?

SIM

A government entity must show that there is probable cause to believe the contents of a wire communication, an electronic communication, or other records are relevant to an ongoing criminal investigation to obtain which type of order?

Search warrant

To view Gmail Web e-mail headers, what should be clicked after the e-mail has been opened and the down arrow next to the Reply circular arrow has been clicked?

Show Original

With cloud systems running in a virtual environment, what can be used to give the investigator valuable information before, during, and after an incident?

Snapshot

In which cloud service level are applications delivered via the Internet?

Software as a service

What technique has been used to protect copyrighted material by inserting digital watermarks into a file?

Steganography

Which term comes from the Greek word for "hidden writing"?

Steganography

Which term refers to a data-hiding technique that uses host files to cover the contents of a secret message?

Steganography

In addition to search warrants, what defines the scope of civil and criminal cases?

Subpoenas

Which data-hiding technique replaces bits of the host file with other bits of data?

Substitution

Which type of digital network divides a radio frequency into time slots?

TDMA

From which file format is the image format XIF derived?

TIF

In which type of testimony does the investigator present evidence and explain what it is and how it was obtained?

Technical/scientific

Which standard states that, to provide reliable and valid testimony, the expert has the "ethical responsibility to present a complete and unbiased picture of the . . . research relevant to the case at hand?"

The Daubert standard

What is the main information being sought when examining e-mail headers?

The originating e-mail's domain name or an IP address

What is reduced by knowing who the parties in a case are?

The possibility of conflict of interest

What does the SIM file structure begin with?

The root of the system (MF)

What limits the data that can be sought in a criminal investigation?

The search warrant

What technique, in which multiple phones take turns sharing a channel, does the Global System for Mobile Communications (GSM) use?

Time Division Multiple Access

Bitmap images are collections of dots, or pixels, in a grid format that form a graphic.

True

If a graphics file is fragmented across areas on a disk, you must recover all the fragments before re-creating the file.

True

In the United States, there's no state or national licensing body for digital forensics examiners.

True

Lawyers use services called deposition banks (libraries), which store examples of expert witnesses' previous testimony.

True

The chain of custody of evidence supports the integrity of your evidence.

True

The two major forms of steganography are insertion and substitution

True

There are inherent conflicts between the goals of attorneys and the goals of scientists or technicians (experts).

True

What kinds of images are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes?

Vector Graphics

To view e-mail headers on Yahoo!, what should be clicked on after "More" has been selected?

View Raw Message

Which document is sworn to under oath and penalty of perjury, or a comparable false swearing statute?

Written Report

Which header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C 01 00 00 20 65 58 74 65 6E 64 65 64 20 03?

XIF

What should you use to verify evidence and thus ensure its integrity?

hash algorithms

What method might be used by opposing attorneys to prevent an investigator from serving on an important case?

Conflicting out

Which document offers comprehensive guidance for psychologists, with an entire section devoted to forensics activities?

APA's Ethics Code

What should be created in order to begin a digital forensics case?

An Investigation Plan

A written report is often submitted as what type of document?

An affidavit

Which document serves as a guideline for knowing what questions an investigator should expect when testifying?

An examination plan

Under FRCP, Rule 26, where must the investigator's curriculum vitae be placed unless the bona fides are integrated elsewhere?

Appendixes

Which program has an indexed version of the NIST NSRL of MD5 hashes that can be imported to enhance searching for and eliminating known OS and application files?

Autopsy

Which data-hiding technique changes data from readable code to data that looks like binary executable code?

Bit Shifting

Which images store graphics information as grids of pixels?

Bitmap

What technology, developed during WWII, uses the full radio spectrum to define channels and is now used in the U.S. by Sprint, U.S. Cellular, and Verizon?

CDMA

What term refers to recovering fragments of a file?

Carving

What name is used for the configuration typically used for e-mail messages that are distributed from a central server to many connected client computers?

Client/server architecture

In which discipline do professionals listen to voice recordings to determine who's speaking or read e-mail and other writings known to be by a certain person and determine whether that person wrote the e-mail or letter in question?

Forensic linguistics

What tools are used to create, modify, and save bitmap, vector, and metafile graphics?

Graphics Editors

What is the simplest way to access a file header?

Hexadecimal editor

Because digital forensics tools have limitations in performing hashing, what tools should be used to ensure data integrity?

Hexadecimal editors

What structure is used for the file system for a SIM card?

Hierarchical

Which data-hiding technique places data from the secret file into the host file without displaying the secret data when the host file is viewed in its associated program?

Insertion

Which type of compression compresses data permanently by discarding bits of information in the file?

Lossy

Metadata in a prefetch file contains an application's ____ times in UTC format and a counter of how many times the application has run since the prefect file was created.

MAC


Set pelajaran terkait

CH 13 DISORDERS OF RED BLOOD CELLS STUDY GUIDE QUESTIONS

View Set

Chapter 6 Security Operations and Admin

View Set

Corporations: Formation and Organization

View Set

Philosophy 101: Religion & Philosophy

View Set

A&P I Chapter 12 Review Sheet -1 (12.1-12.3)

View Set

US History - Westward Expansion Vocab & Key Terms

View Set