Final Exam - Computer Forensic Methods

Ace your homework & exams now with Quizwiz!

Hexadecimal Units

A Hash value is an alphanumeric value represented in:

Bits

A algorithm is an alphanumeric value represented in:

copy, original

A bit-stream copy is a bit-by-bit _________ (also known as a "forensic copy") of the ________ drive or storage medium and is an exact duplicate

True

A bit-stream copy is a bit-by-bit copy also know as a sector copy of the original drive or storage medium and is an exact duplicate.

file, copy

A bit-stream image is the _____ containing the bit-stream ____ of all data on a disk or disk partition.

True

A bit-stream image is the file containing the bit-stream copy of all data on a disk or disk partition.

False

A raw format integrates metadata into the image file.

affidavit , search warrant

A(n) ________ provides the facts to support the evidence of a crime to submit before a judge when requesting a ________ __________

All of the above

According to the author of the textbook, clusters are specific to:

Chain of custody

According to the author, what do you call a list of people who have had physical possession of the evidence?

False

Advanced Forensic Format (AFF) is a proprietary format.

False

Backup software can copy deleted files and recover file fragments.

FFD8 FFE1

Choose the correct header value for the file type of an EXIF JPEG file.

0

Clusters are numbered sequentially, starting at ___ in File Allocation Table (FAT).

False

Digital forensics and data recovery refer to the same activities.

none of the above

Drive slack includes which of the following?

Inculpatory

Evidence that indicates a suspect is guilty of a crime is:

True

Exculpatory evidence might clear the suspect.

False

FTK Imager can acquire a drive's HPA and the device configuration overlay (DCO).

three

FTK Imager offers ______ modes for previewing electronic data

False

File slack is the unused space in a cluster between the end of an active file and the end of the cluster.

False

For the three (3) types of acquisitions, data can be collected with five methods.

False

Forensic copy is another name for streaming video

False

In an effort to reduce the relationship with firmware, Intel developed EFI, which defines the interface between a computer's firmware and the operating system.

True

Inculpatory evidence might be incriminating.

encryption, unreadable

Making a physical acquisition of a drive with ____ can result in _____ data.

Clusters

Microsoft operating systems allocate disk space for files by:

False

Private investigations involve government agencies responsible for criminal investigations and prosecution

All of the above

The ____ of an e-mail message contains unique identifying numbers, such as the IP address of the server that sent the message

Automatic

The _______ mode automatically chooses the best method for previewing a file's contents, according to the file type.

False

The bootstrap process, which is contained in RAM, tells the computer how to proceed, when the digital forensics specialists must boot to a forensically configured USB drive.

False

The data a forensics acquisition tool collects is stored as a bit-stream copy, typically in an open source or proprietary format.

True

The unused space between sectors is called the partition gap.

False

There are three (3) types of data acquisition methods for computer forensics.

hashing

Validating digital evidence requires using a _______ algorithm utility.

Fourth

What Amendment to the U.S. Constitution (and each state's constitution) protects everyone's rights to be secure in their person, residence, and property from search and seizure.

Chain of Custody

What do you call a list of people who have had physical possession of the evidence?

Hardware and Software

When a digital forensics specialists needs to create a forensic copy of the suspects computer or inspect data related to the investigation, the specialists should be familiar with both the computer's (what and what)

Find Answer

Where would the investigator of an e-mail crime find the IP address of sending server?

Arin,internic or whois

Which is a tool used for the whois lookup program to search for the owner of an Internet Protocol Address?

None of the above

Which of the following file systems did Microsoft specifically design for floppy disks.

.e01

Which of the following formats is FTK Imager designed to read?F

Find Answer

Which of the following formats is FTK imager designed to read?

static

Which of the following is "not" a storage format for digital evidence?

dd

Which of the following is "not" a type of data acquisition

Sectors

Which of the following terms refers to a section on a track?

live

Which type of acquisition method is performed if the computer has an encrypted drive and the power is on and logged on by the suspect?

False

Yahoo is a service provider for e-mail and access to the Internet.

Disaster recovery

________ involves preventing data loss by using backups, uninterruptible power supply (UPS) devices, and off-site monitoring.

False

exculpatory evidence indicates the suspect is guilty of the crime.

False

inculpatory evidence indicates the suspect is innocent of the crime.

Data recovery

involves recovering information from a computer that was deleted by mistake or lost during a power surge or server crash.


Related study sets

Chapter 4 Questions (end of chapter)

View Set

US History Chapter 15: Conquering a Continent, 1860-1890

View Set

USAHS Movement Science I - Components of Functional Tasks

View Set

Anatomy ii- Chapter 16 Lymphatic System

View Set

Chapter 4- Gravity and Orbits (COPY OF TEST)

View Set

Quiz 10: passive voice identify main subject and verb

View Set