CSC 410 Fall 2019 Final/Quiz Guide

Ace your homework & exams now with Quizwiz!

The MD5 algorithm takes as input a message of ___________ and produces as output a ___________ bit "fingerprint" of the data.

Arbitrary length, 128-bit

Where can you change the Boot Order?

BIOS

Which of the following is NOT a Safety Net procedure?

Do analysis on original piece of evidence

All file types have a footer.

False

The letters in the acronym PPAD stands for Preserve, Protect, Analyze and Decide.

False

Write blocking should always be performed with a "live forensics" case.

False

Which of the following is not true about password protected file?

File data is converted to unreadable data.

A VM can be used as a "safe" testing environment to run unknown applications or virus infected files.

True

The MD5 algorithm was designed so that it is computationally unfeasible to produce two inputs having the same hash output, or to produce any input having a given pre-specified target hash output.

True

What is SAFE Block To Go?

A software writeblocker

According to the lecture, which of the following scenarios would result in a digital forensic examiner wanting to do a restore?

All of the above (jury presentation, The native environment or device is needed in order for the data to be interpreted, When you need a clone of the original drive to put the computer back in its original state)

What can both the Application Administrator and Case Administrators do?

Assign Rights to cases, Create Cases

A computer forensic examiner is never allowed to do analysis on-site.

False

According to the lecture, what is the most common reason for bad images during the imaging process?

I/O errors

Which is NOT correct about the Safety Net?

It is a specific list of items an examiner must follow at every crime scene.

What is the name of the test that analyzes whether or not the person's expectation of privacy was reasonable?

Katz Test

Which of the following scenarios would cause a search of a jpeg header to fail in locating the jgep image?

None (user changes file extension to .dat, user changes file name, user embed jpeg in another file)

Which native feature(s) of Windows To Go provides disk write blocking?

None of the Above (not read-only disk attributes or san policy 4-offline internal)

List the Order of Volatility of the following data types from most volatile to least volatile: Network state, RAM contents, Disk Contents, Running Processes

Order of Volatility: RAM contents, Network State, Running Processes, Disk Contents

What two levels are forensic analysis conducted on?

Physical and Logical

Which of the following image types is not compressed?

Raw (dd)

Disk Cloning in WinHex copies a defined number of _______ from a source drive to a destination disk.

Sectors

What is the name of the location where you place imaged data from a suspect's storage device?

Target media

A search is constitutional if it does not violate a person's reasonable expectation of privacy.

True

After the acquisition phase, hashing should be used to ensure the data (or copies of the original) have not changed.

True

As long as the forensic examiner is attempting to find data that is responsive to the warrant, the Fourth Amendment does not limit the techniques an examiner may use to examine a device.

True

Checksums and CRCs are not used to verify data in digital forensics because two different sets on data can have the same values.

True

Exceptions to having a warrant include consent, exigent circumstances, search during a lawful arrest, plain view, boarder searches, and a person is on parole.

True

File signatures do not always start at the first byte.

True

If the text is compressed, a standard string search will not find any matching hits.

True

Image verification is used to ensure that copies of the original image are identical to the original media.

True

In LiveView, you may boot from a disk image that is split or chunked as long as you select all of the pieces.

True

In a private sector business, employers or co-employees of common authority may provide consent to law enforcement for a search of an employee's area.

True

Installing a keylogger program is a covert method of obtaining a password.

True

Which of the following describes NAT Networking in VMWare?

Uses host NIC and shares IP address with host

Of the following operating systems, which needs files to have a file extension?

Windows 7

Which of the following is the correct order to prepare a target drive for an acquisition?

Wipe Drive, Partition Drive, Format Drive

According to the lecture, which type of file results in several repeated finds of the same data?

Zip files

What is the Helix (Linux) command to wipe a target drive?

dd

What is the difference between a physical and logical image?

A physical image is of an entire drive, while a logical image is of a single partition or set of files. Physical images are bootable when restored because it captures the MBR, unallocated space, slack space, etc. Logical images may or may not include deleted data.

Which of the following cannot be bookmarked in FTK?

All (data carved files, email attachments, text file with highlighted text)

What information cannot be used to conduct a search?

All can be used (file sizes, string search, file extensions, file creation dates)

In LiveView, you may boot from which of the following locations?

All of the above (physical disk, disk image file on encrypted network share, disk image file on local machine)

Which of the follow should a Control Boot Disk NOT utilize?

An OS that allows writing to attached disks

Data in an E01 image is broken into blocks that have a default size of 512 sectors.

False

Even if a file is fragmented, you can use the defined space between the header and footer to carve the entire file.

False

Even if a ribbon cable is worn and bent, they are so reliable that they rarely cause errors when creating an image.

False

In which cases should agents obtain multiple warrants?

If agents are doing a network search that may obtain data in different locations.

To use the Index Search feature, you must first process the case but this is not necessary for Live Search.

True

The SHA1 algorithm takes as input a(n) __________ and produces an output of length __________.

length < 2^64 bits, 160 bit

Most forensic software has the ability to go to the exact physical sector marked as corrupted and identify which file(s) are located in those sectors.

True

Which of the following is not considered by agents in determining if exigent circumstances exist?

The total "value" of the evidence in the case is worth enough to save

For Windows XP machines, the local administrator is no longer the default Data Recovery Agent but there is still a requirement that one exists.

False

High heat does not damage electronic media.

False

If a computer requires a BIOS password, if you connect the hard drive to a forensic workstation it will still require the BIOS password to see the drive.

False

When using FTK Imager, it is not necessary to use a write-blocker because there is one built into this tool that automatically starts when you launch the program.

False

With SAFE Block To Go enabled and a target disk is blocked, you can still clean, partition, and format the drive using Diskpart.

False

What is the quick picks symbol?

Green pentagon

Which of the following is FALSE about verifying a RBS image?

Hashing tools can tell the user how many changes have been made on an image.

Which tab in FTK would show how many Microsoft Word 2000 documents were in a case?

Overview tab

Briefly discuss the importance of Trusted Binaries in terms of forensic acquisition.

The use of known good applications (also referred to as trusted binaries) to investigate of acquire a suspect host is important for a couple of reasons. Since many OS component tools (e.g. netstat, nbstat, ipconfig etc) are OS version dependent, it's important to have a toolkit with trusted versions of any such tools for all the OS versions you will encounter because it is possible that the tools on the suspect machine may be corrupt or missing or maliciously tampered with.

One can view graphic files that are partial carved, but cannot view Microsoft application files that are partial carved.

True

One may adjust the carving size parameters up OR down and re-perform the data carve.

True

Orphaned objects are files/folders recovered, but the original parent folder is unknown.

True

The probable cause standard needed for warrants requires only a reasonable chance that contraband or evidence will be found.

True

To crack local account logon passwords you need the SAM and System file and for a domain account logon password you need the System and Security hives.

True

To ensure a tool is forensically sound, a computer forensic examiner should test and validate their own tools before using it on evidence.

True

While giving an expert testimony in court as a computer forensic analyst, one should only report their findings and not hypothesize on possible scenarios related to the case.

True

With Windows To Go, protected by SAFE Block To Go, you can use your favorite forensic tools, such as X-Ways, EnCase and FTK Imager

True

Your actions in everything you do as a computer forensic examiner will impact the credibility of your testimony.

True

Which file type can FTK's Data Carving not find?

WPD (Word Perfect Documents)

All file types have a header.

False

In a live acquisition, your pre-acquisition hash value of your disk or partition should ALWAYS match against the hash of the capture data.

False

In a live acquisition, your process and results of your capture should always be reproducible.

False

In computer forensics, RBS stands for reliable bit stream

False

In the Overview tab, the File Category categorizes files based on the header, not extension.

False

KFF stands for Known File Footer.

False

Linux Live CDs utilize software-write blocking.

False

LiveView will work with e01 and RBS images

False

Once assigned to a case everyone has full access, regardless of user type.

False

Once consent is given to a person of authority to search, it cannot be withdrawn at any time during an investigation.

False

Regardless of a child's age, parents are always able to provide consent to searches on their children's computer.

False

String search hits will never be found on a fragmented file because search tools cannot interpret the file system information.

False

The Fifth Amendment limits the ability of government agents to search for and seize evidence without a warrant.

False

The Fifth and Tenth Circuits view the computer as a single container as opposed to treating individual files as separate containers.

False

The disadvantage of asymmetric-key algorithms is that they require a shared secret key. Whereas symmetric-key algorithms use separate public and private keys.

False

The logical image hash value and the physical image hash value will always be the same.

False

The only use of hash values is for data authentication, which means to prove two things are the same.

False

Unicode is 1 byte per character and ASCII is 2 bytes per character.

False

When at a crime scene, the computer forensic examiner is not required to follow proper Chain of Custody procedures because that is only for police officers.

False

When searching with the operating system, you can always find items such as system files and data in unallocated space.

False

Which of the following is not a one of the write-blocking requirements?

The tool should be a hardware device as opposed to a software device.

Briefly identify two (2) situations in which a live acquisition would be considered over a "dead" or "cold" forensic acquisition. (Include examples of potential evidence that you may acquire in these situations)

1) We would consider a live acquisition if there was a risk of losing integral data if we were to proceed with a regular shutdown. For example, an evidence eliminator applications may installed to remove data at shutdown, or a pagefile may be set in the registry to wipe at shutdown. If we perform a regular shutdown we also run the risk of losing data not stored on the disk, such as RAM contents (which may contain important passwords or user information etc), open ports, running processes, and logged on users. 2) Live acquisition should also be considered when dealing with Full Disk Encryption or open encrypted drives, since we would not be able to obtain cached passwords or passphrases in RAM if we were to pefrorm a "cold" acquisition in this case.

How many binary files make up the DOS Controlled Boot Disk?

3

Which of the following is NOT true about E01 images?

A mismatch of one CRC will not affect the verification as long as the MD5 or SHA1 matches.

What operating system tool enables full disk or volume encryption?

Bitlocker

Which of the following is not true about Windows EFS?

Both (Exists on the FAT and NTFS partition, A new feature released with Windows XP is one can force a password change to log on to a system as a user and view the EFS encrypted files.)

Which of the following is NOT listed as a Pre-Processing Option in FTK?

Concatenate DriveFreeSpace

What does CRC stand for? How long is a CRC?

Cyclic redundancy check, 32 bits

A forensic examiner can only look at raw data at the logical level.

False

A logical image is bootable when restored in a program, such as VMWare, because it includes the MBR and partition tables.

False

A person still has Fourth Amendment Protections if their computer is at a repair shop.

False

As long as a warrant particularly describes the person or things to be seized, then it fulfills the Fourth Amendment.

False

Because of privacy laws, a police officer is not allowed to ask others for passwords used on their computer.

False

Bridge-networking should always be selected when restoring a sized hard drive image.

False

What does the Matlock approach imply?

If two people have equal joint access and control to a computer, only one person needs to give consent to a search even if the other is not present or objects.

Which of the following types of data is most volatile?

Registers, cache


Related study sets

Y= 1/ 1-c1 * (c0 + I + G - c1T) - EQ NEL MKT DEI BENI -

View Set

Chapter 13 Recognizing Employee Contributions with Pay

View Set

Chapter 15 Quiz - Principles of Business, Marketing, & FInance

View Set

Status, Prestige, and Social Dominance

View Set

Lesson1 你好歌 Ni Hao Ge = Hello Song

View Set