ITN 277

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The ___________ directory holds compiled files, which means programs, including some malware may be found there

/bin

The _________ directory is different from any other directory in that it is not really stored on the hard disk. It is created in memory and keeps information about currently running processes

/proc

Post Office Protocol (POP)

A protocol used to retrieve email from a mail server. POP3 is a later iteration of the POP protocol, Port 110

Simple Mail Transfer Protocol (SMTP)

An Internet-standard protocol for sending email messages between servers on IP networks. Because SMTP is generally used to send messages from a mail client to a mail server Port 25

In Linux, as with windows, the first sector on any disk is called the

Boot sector

Maintaining __________ is a problem with live systems forensics in which data is not acquired at a unified moment

Data consistency

The majority of digital cameras use the __________ format to store digital pictures.

EXIF

Many devices, such as floppy and CD-ROM drives, are mounted in the /var directory.

False

The Windows Registry is organized into five sections. The ________________ section is very critical to forensic investigation. It has profiles for all the users, including their settinigs

HKEY_USERs (HKU)

If you can't open an image file in an image viewer, the next step is to examine the file's ____.

Header data

The simplest way to access a file header is to use a __________ editor

Hexadecimal

______________ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

Insertion

A(n) ___________ file has a hexadecimal header value of FF D8 FF E0 00 10.

JPEG

Post power function

Power on self test, tests BIOS

A number of tools and even some windows utilities are available that can help you to analyze live data on a windows system, Use _____________ to view process and thread statistics on a system

PsList

__________ has also been used to protect copyrighted material by inserting digital watermarks.

Steganography

The image format XIF is derived from the more common ____________ file format.

TIFF

which of the following statement is true regarding the categories into which P2 Commander has presorted files

They make it easy to search for files in the evidence drive

Patriot Act

This law passed after 9/11 expanded the tools used to fight terrorism and improved communication between law enforcement and intelligence agencies

GNOME, which is built on GTK+, is a cross platform toolkit for creating graphical user interfaces

True

Like Windows, Linux has a number of logs that can be very interesting for a forensics investigation. The /var/log/ log is the printer log. It can give you a record of any items that have been printed from this machine

True

SNORT is an open source intrusion detection system (IDS)

True

_________ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes

Vector graphics

The ________ header starts with a hexadecimal value of 49 49 2A and has on offset of four bytes of 5C01 0000 2065 5874 656E 6465 6420 03

XIF

_____ images stores graphics information as grids of individual pixels

bitmap

In the Linux boot process, the MBR loads up a ___________ program, such as LILO

boot loader

How can forensic investigators prove the evidence was not altered during the course of an investigation

by showing that the hash code before the data was reviewed is identical to the has code after the investigation

Recovering pieces of a file is called ____.

carving

As you drill down within the file structure, the drives, directories, sub-directories, and folders of the evidence drive are added to the P2 Commander:

case file

When working with image files, computer investigators also need to be aware of ________ laws to guard against copyright violations

copyright

Electronic Communication act

creates statutory restrictions on government access to such evidence from ISPs or other electronic communications service providers.

You can use the ________ command to make a physical image of what is live in memory.

dd

The process of converting raw pictures data to another format is refered to as

demosaicing

Which of the following is the definition of heap

dynamic memory for a program comes from the heap;segment;a process may use a memory allocator such as malloc to request dynamic memory

How is an audit trail of every machine through which an e-mail message has passed created?

each server along the way adds its own information to the message header

P2 Commander includes a(n) ___________ that enables the investigator to sort, search scan, and otherwise work with the e-mail data to find the data most relevant to the case.

email analyzer

The ____________ keeps a record of the message's journey as it travels through the communications network

email message header

______________ compression compresses data by permanently discarding bit of information in the file

lossy

What term is used to describe one of the five sections of the Windows registry

registry key

______________ is the art of hiding information inside image files

steganography

What is meant by a slurred image?

the result of acquiring a file as it is being updated

at a minimum, an email message header must include

the sender's account and the date

All versions of Windows support logging. The Applications and services log is used to store events from a single application or component rather than the events that might have system wide impact

true

The swap file is also referred to as virtual memory

true

The windows registry is a repository of all the information on a windows system

true

a mail server is like an electronic post office: It sends and recieves electronic mail

true

simple mail transfer protocol (smtp) is a protocol used to send e-mail that work on port 25

true

_____________________ is a live-system forensics technique in which you collect a memory dump and perform analysis in an isolated environment.

volatile memory analysis

Internet Mail Access Protocol (IMAP)

which operates on port 143. The main advantage of IMAP over POP3 is it allows the client to download only the email headers to the machine, so that the user can choose which messages are to be downloaded completely.

P2 Commander includes the option to calculate hash codes for drives and partitions. When this option is selected:

P2 commander automatically creates hash codes for the data on the evidence drive

Which Linux shell command lists all currently running processes that the user has started ( any program or daemon is a process)

PS


Set pelajaran terkait

AMSCO Chapter 20-25 quiz questions

View Set

Chapter 6-- additional coverages, extensions, and exclusions

View Set

ENG-121 Academic Writing I Midterm - Saint Leo

View Set

ATI Maternal Newborn Prenatal Education Part 2

View Set

Chapter 3 -- Digestion, Absorption, and Transport

View Set

Civil Liberties and Civil Rights

View Set