quiz 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

briefly describe the differences between brute force attacks and dictionary attacks to crack passwords

Brute force attacks- Use every possible letter, number, and character found on a keyboard. dictionary attacks- Uses common words found in the dictionary and tries them as passwords, Most use a variety of languages

if Mac OS, the _______ fork typically contains the user creates

Data

What is steganography? how might it affect your investigation?

The art of hiding information inside image files

If a file contains information, it always occupies at least one allocation block.

True

If a graphics file is fragmented across areas on a disk, first you must recover all the fragments to re-create the file.

True

With many computer forensics tools, you can open files with external viewers.

True

for static acquisitions, remove the original drive from the computer, if practical, and then check the dat and time values in the systems BIOS/CMOS

True

private sector cases, such as employee abuse investigation, might not specify limitation in recovering data

True

the internet is the best source for learning more about file formate and their extensions

True

recovering fragments of a file is called ______

carving

Mac OS is built with new apply files systems. the current version offers better security, encryption, and performance speeds, but users can mount HFS+ drives

false

Steganography cannot be used with file formats other than image files.

false

windows OSs do not have a kernel

false

You use ____ to create, modify, and save bitmap, vector, and metafile graphics files.

graphic editors

One way to hide partitions is with the windows disk partition utility _____

harddrive

if you can't open a graphics file in an image viewer, the next step is to examine the files _______

header data

Data ____ involves changing or manipulating a file to conceal information.

hiding

_______ contain file and directory metadata and provide a mechanism for linking data stored in data blocks

inodes

you begin a digital forensics case by creating a _______

investigation plan

what compatibility issues exist when connecting a NTFS formatted drive to an apple computer? What compatibility issues exist when connecting a HFS+ formatted drive to a windows computer

it won't connect to a apple computer at all but when it connects to the windows the computer will start just won't work

if MacOS, volumes have allocation blocks and ______ blocks

logical

______ compression compresses data by permanently discarding bits of information in the file

lossy

what is exchangeable image file (EXIF) data and how it might be useful to an investigation

metadata contained in a image file; can provide valuable information such as the camera that took the photo and if it was altered

_____ alters hash values, which makes cracking passwords more difficult

salting passwords

______ increases the time and resources needed to extract, analyze, and present evidence

scope creep

For target drives, use only recently wiped media that have been reformatted and inspected for computer viruses.

true

some encryption schemes are so complex that the time to crack them can be measured in days, weeks, years, and even decades

true

______ are based on mathematical instructions that defines lines, curves, texts, ovals, and other geometric shapes

vector graphics

criminal investigations are limited to finding data defined in search ______

warrants


Set pelajaran terkait

BIOLOGY - UNIT 8: HUMAN ANATOMY AND PHYSIOLOGY ENVIRONMENTAL INTERACTION

View Set

Instrument Pilot Oral Exam Guide Eighth Edition

View Set

Nursing Care of the Child With an Alteration in Bowel Elimination/Gastrointestinal Disorder

View Set

CHAPTER 10: MOTIVATION AND EMOTION

View Set

EXSC 340 final pt 7 Identify a true statement about the concept of specificity as a training principle.

View Set

Tuckman and Four Stages of Group Development

View Set

Med Surg: Patients With Musculoskeletal Trauma

View Set