Computer forensics exam 1

Ace your homework & exams now with Quizwiz!

With newer Linux kernel distributions, USB devices are automatically mounted, which can alter data on it.

true

Policies can address rules for which of the following?

All

Evidence storage containers should have several master keys.

FALSE

The ANAB mandates the procedures established for a digital forensics lab.

FALSE

____ often work as part of a team to secure an organization's computers and networks.

FORENSIC INVESTIGATORS

A warning banner should never state that the organization has the right to monitor what users do.

False

ASQ and ANAB are two popular certification programs for digital forensics.

False

Data collected before an attorney issues a memo for an attorney-client privilege case is protected under the confidential work product rule.

False

Slower data transfer speeds and dealing with minor data errors are two disadvantages of the raw format

False

The ANAB mandates the procedures established for a digital forensics lab.

False

You should always prove the allegations made by the person who hired you.

False

You shouldn't include a narrative of what steps you took in your case report

False

What does a sparse acquisition collect for an investigation?

Fragments of unallocated data in addition to the logical allocated data

Why is it a good practice to make two images of a suspect drive in a critical investigation?

To ensure at least one good copy of the forensically collected data in case of any failures

Embezzlement is a type of digital investigation typically conducted in a business environment.

True

One way to determine the resources needed for an investigation is based on the OS of the suspect computer, list the software needed for the examination.

True

The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas different from your own specialties in case you need help on an investigation.

True

To determine the types of operating systems needed in your lab, list two sources of information you could use.

Uniform Crime Report statistics and a list of cases handled in your area

What's the most critical aspect of digital evidence?

Validation

The triad of computing security includes which of the following?

Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation

A ____ plan specifies how to rebuild a forensic workstation after it has been severely contaminated by a virus from a drive you're analyzing.

disaster recovery

It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.

exhibits

A forensic workstation should always have a direct broadband connection to the Internet.

fALSE

Computer investigations and forensics fall into the same category: public investigations.

false

Digital forensics facilities always have windows.

false

FTK Imager can acquire data in a drive's host protected area.

false

For daily work production, several examiners can work together in a large open area, as long as they all have different levels of authority and access needs.

false

If damage occurs to the floor, walls, ceilings, or furniture on your computer forensics lab, it does not need to be repaired immediately.

false

Some acquisition tools don't copy data in the host protected area (HPA) of a disk drive.

true

The lab manager sets up processes for managing cases and reviews them regularly.

true

Which organization has guidelines on how to operate a digital forensics lab?

ANAB

List three items that should be on an evidence custody form.

Case number, name of the investigator and nature of the case

ASQ and ANAB are two popular certification programs for digital forensics.

FALSE

A logical acquisition collects only specific files of interest to the case.

true

What are two concerns when acquiring data from a RAID server?

Amount of data storage needed and type of RAID

Why is professional conduct important?

It includes ethics, morals, and standards of behavior

Which organization provides good information on safe storage containers?

NISPOM

For labs using high-end ____ servers or a private cloud (such as Dell PowerEdger or Digital Intelligence FREDC), you must consider methods for restoring large data sets.

RAID

____, or mirrored striping with parity, is a combination of RAID 1 and RAID 5.

RAID 15

The police blotter provides a record of clues to crimes that have been committed previously.

TRUE

There's no simple method for getting an image of a RAID server's disks.

TRUE

In Linux, the fdisk -l command lists the suspect drive as /dev/hda1. So, the following dcfldd is command correct. dcfldd if=image_file.img of=/dev/hda1

false

When determining which data acquisition method to use you should not consider how long the acquisition will take.

false

One way to investigate older and unusual computing systems is to keep track of ____ that you can find through an online search.

forums and blogs

In the Linux dcfldd command, which three options are used for validating data?

hash, hashlog, and vf

Published company policies provide a(n) ____ for a business to conduct internal investigations.

line of authority

Most remote acquisitions have to be done as ____ acquisitions.

live

The ____ command displays pages from the online help manual for information on Linux commands and their options.

man

You should have at least one copy of your backups on site and a duplicate or a previous copy of your backups stored in a safe ____ facility.

offsite

The EMR from a computer monitor can be picked up as far away as ____ mile.

1/2 mile

Large digital forensics labs should have at least ________ exits.

2

What's the maximum file size when writing data to a FAT32 drive? Commonly, proprietary format acquisition files can compress the acquisition data and segment acquisition output files into smaller volumes.

2gb

The manager of a digital forensics lab is responsible for which of the following?

ALL

With remote acquisitions, what problems should you be aware of?

Antivirus, antispyware, and firewall programs

Before enlisting in a certification program, thoroughly research the requirements, ________, and acceptability in your area of employment.

COST

What do you call a list of people who have had physical possession of the evidence?

Chain of custody

Which forensics tools can connect to a suspect's remote computer and run surreptitiously?

EnCase Enterprise and ProDiscover Incident Response

Name two commercial tools that can make a forensic sector-by-sector copy of a drive to a larger drive.

EnCase and X-Ways Forensics

Digital forensics and data recovery refer to the same activities.

False

If a visitor to your digital forensics lab is a personal friend, it's not necessary to have him or her sign the visitor's log.

False

Police in the United States must use procedures that adhere to which of the following?

Fourth amendment

Name the three formats for digital forensics data acquisitions.

Raw format, proprietary formats, and AFF

Typically, a(n) ________ lab has a separate storage area or room for evidence.

Regional

What is one of the necessary components of a search warrant?

Signature of an impartial judicial officer

What term refers to labs constructed to shield EMR emissions?

TEMPEST

An employer can be held liable for e-mail harassment.

TRUE

The Fourth Amendment to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.

TRUE

Your business plan should include physical security items.

TRUE

Why should you critique your case after it's finished?

To improve your work

Why should you do a standard risk assessment to prepare for an investigation?

To list problems that might happen when conducting an investigation

Why should evidence media be write-protected?

To make sure data isn't altered

Why is physical security so critical for digital forensics labs?

To prevent data from being lost, corrupted, or stolen

What's the purpose of an affidavit?

To provide facts in support of evidence of a crime to submit to a judge when requesting a search warrant

Building a business case can involve which of the following?

aLL

In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.

affidavit

Based on the incident or crime, the complainant makes a(n) ____, an accusation or supposition of fact that a crime has been committed.

allegation

Before enlisting in a certification program, thoroughly research the requirements, ________, and acceptability in your area of employment.

cost

The ____ group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.

digital investigations

Of all the proprietary formats, which one is the unofficial standard?

expert witness

Under normal circumstances, a private-sector investigator is considered an agent of law enforcement.

false

One major disadvantage of ____ format acquisitions is the inability to share an image between different vendors' computer forensics analysis tools.

propitary

A ____ usually appears when a computer starts or connects to the company intranet, network, or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will.

warning banner

A forensics analysis of a 6 TB disk, for example, can take several days or weeks.

true

Your ____ as a digital investigation and forensics analyst is critical because it determines your credibility.

professional conduct

In general, a criminal case follows three stages: the complaint, the investigation, and the ____.

prosecution

____ involves determining how much risk is acceptable for any process or operation, such as replacing equipment.

risk management

Typically, a(n) ____ acquisition is done on a computer seized during a police raid, for example.

static

A secure storage container or cabinet shoA secure storage container or cabinet should be made of ____ and include an internal cabinet lock or external padlock. uld be made of ____ and include an internal cabinet lock or external padlock.

steel

A good working practice is to use less powerful workstations for mundane tasks and multipurpose workstations for the higher-end analysis tasks.

true

A hashing algorithm is a program designed to create a binary or hexadecimal number that represents the uniqueness of a data set, file, or entire disk.

true

A separate manual validation is recommended for all raw acquisitions at the time of analysis.

true

Acquisitions of RAID drives can be challenging and frustrating for digital forensics examiners because of how RAID systems are designed, configured, and sized.

true

After a judge approves and signs a search warrant, it's ready to be executed, meaning you can collect evidence as defined by the warrant.

true

Commonly, proprietary format acquisition files can compress the acquisition data and segment acquisition output files into smaller volumes.

true

Computing systems in a forensics lab should be able to process typical cases in a timely manner.

true

FTK Imager requires that you use a device such as a USB dongle for licensing.

true

For digital evidence, an evidence bag is typically made of antistatic material.

true

One way to determine the resources needed for an investigation is based on the OS of the suspect computer, list the software needed for the examination.

true

The main goal of a static acquisition is the preservation of digital evidence.

true

The most common and time-consuming technique for preserving evidence is creating a duplicate copy of your disk-to-image file.

true

The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas different from your own specialties in case you need help on an investigation.

true

There's no simple method for getting an image of a RAID server's disks.

true

To be a successful computer forensics investigator, you must be familiar with more than one computing platform.

true


Related study sets

Unit lll Practice Test (Ap Psychology)

View Set

Mental Health Unit IV (CH 18, 20, 22, 24, 28, 29): questions from Quizlet, end-of-chapter, and online resources NCLEX questions (but NOT online resources pre- or post-test questions)

View Set

Cirrhosis HESI Case Study (evolve)

View Set