Digital Forensics CSC 280 Midterm

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/171

flashcard set

Earn XP

Description and Tags

Last updated 7:11 PM on 10/10/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

172 Terms

1
New cards

Digital forensics and data recovery refer to the activities.

false

2
New cards

Which group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime?

digital investigations

3
New cards

After a judge approves and signs a search warrant, it's ready to be executed, meaning you can collect evidence as defined by the warrant.

true

4
New cards

To be a successful computer forensics investigator, you must be familiar with more than one computing platform.

true

5
New cards

The OS of the suspect computer and list the software needed for the examination are some ways to determine the resources needed for an investigation. True or False?

true

6
New cards

You should always prove the allegations made by the person who hired you. True or False?

false

7
New cards

Data collected before an attorney issues a memo for an attorney-client privilege case is protected under the confidential work product rule. True or False?

false

8
New cards

Under normal circumstances, a private-sector investigator is considered an agent of law enforcement. True or False?

false

9
New cards

What process refers to recording all the updates made to a workstation?

configuration management

10
New cards

Which activity involves determining how much risk is acceptable for any process or operation?

risk management

11
New cards

The ANSI-ASQ National Accreditation Board (ANAB) is a wholly owned subsidiary of the American Society of Crime Laboratory Directors (ASCLD).

false

12
New cards

Digital forensics facilities always have windows. True or False?

false

13
New cards

Evidence storage containers should have several master keys. True or False?

false

14
New cards

The ANAB mandates the procedures established for a digital forensics lab. True or False?

false

15
New cards

To determine the types of operating systems needed in your lab, two sources of information you could use: Uniform Crime Report statistics for your area and a list of cases handled in your area or at your company. True or False?

true

16
New cards

popular certification programs for digital forensics include: IACIS, CFCE, CCFP, HTCN, EnCE, ACE, ISFCE, and CCE. True or False?

true

17
New cards

If a visitor to your digital forensics lab is a personal friend, it's not necessary to create a log record for this visit.

false

18
New cards

By what percentage can lossless compression reduce image file size?

50%

19
New cards

In which RAID configuration do two or more disk drives become one large volume, so the computer views the disks as a single disk?

raid 0

20
New cards

What option is used with the dcfldd command to designate a hashing algorithm of md5, sha1, sha256, sha384, or sha512?

hash

21
New cards

With newer Linux kernel distributions, if you connect a hot-swappable device, such a USB drive, containing evidence, it will automatically mount the USB device, which could alter data on it. True or False?

true

22
New cards

In Linux, the fdisk -l command lists the suspect drive as /dev/hda1. Is the dcfldd command: dcfldd if=image_file.img of=/dev/hda1 correct?

no

23
New cards

A hashing algorithm is a program designed to create a binary or hexadecimal number that represents the uniqueness of a data set, file, or entire disk. True or False?

true

24
New cards

4 G is the maximum file size when writing data to a FAT32 drive. True or False?

false

25
New cards

FTK Imager can acquire data in a drive's host protected area. True or False? True or False?

false

26
New cards

Of all the proprietary formats, Expert Witness, used by Guidance Software EnCase, is the unofficial standard? True or False?

true

27
New cards

A logical acquisition collect only specific files of interest to the case for an investigation. True or False?

true

28
New cards

For an investigation, a sparse acquisition should not collect fragments of unallocated data in addition to the logical allocated data. True or False?

false

29
New cards

Which tool enables the investigator to acquire the forensic image and process it in the same step?

Magnet AXIOM

30
New cards

Because there are a number of different versions of UNIX and Linux, these OSs are referred to as CLI platforms.

false

31
New cards

Hardware manufacturers have designed most computer components to last about 36 months between failures.

false

32
New cards

When validating the results of a forensics analysis, you should do which of the following?

calculate the hash value with two different tools

33
New cards

Hardware acquisition tools typically have built-in software for data analysis. True or False?

false

34
New cards

Data can't be written to disk with a command-line tool. True or False?

false

35
New cards

Macintosh moved to the Intel processor and became UNIX based with which operating system?

OS X

36
New cards

On a Linux computer, what contains group memberships for the local system?

/etc/group

37
New cards

In macOS volume fragmentation is kept to a minimum by removing clumps from larger files.

false

38
New cards

The pipe (|) character redirects the output of the command preceding it.

true

39
New cards

In macOS, the Disk Arbitration feature can be used to disable and enable automatic mounting when a drive is connected via a USB or FireWire device. True or False?

true

40
New cards

On most Linux systems, current user login information is in which of the following locations?

/var/log/utmp

41
New cards

Which of the following is the main challenge in acquiring an image of a system running macOS?

vendor training is needed

42
New cards

Which of the following Linux system files contains hashed passwords for the local system?

/etc/shadow

43
New cards

Which of the following describes the superblock's function in the Linux file system?

manages the file system, including config information

44
New cards

a technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence of a crime. Which type of task is the technician performing?

data recovery

45
New cards

What does the investigator in a criminal or public-sector case submit, at the request of the prosecuting attorney, if he or she has enough information to support a search warrant?

an affidavit

46
New cards

What is most often the focus of digital investigations in the private sector?

misuse of digital assets

47
New cards

What must be done, under oath, to verify that the information in the affidavit is true?

it must be notarized

48
New cards

What term refers to the individual who has the power to conduct digital forensic investigations?

authorized requester

49
New cards

When an investigator seeks a search warrant, which of the following must be included in an affidavit to support the allegation of a crime?

exhibits

50
New cards

Which doctrine, found to be unconstitutional, was used to allow a civilian or private-sector investigative agent to deliver evidence obtained in a manner that violated the Fourth Amendment to a law enforcement agency?

Silver-platter

51
New cards

Which Pacific Northwest agency meets to discuss problems that digital forensics examiners encounter?

CTIN

52
New cards

Which type of case involves charges such as burglary, murder, or molestation?

criminal

53
New cards

Computer investigations and forensics fall into the same category: public investigations.

false

54
New cards

The definition of digital forensics has evolved over the years from simply involving securing and analyzing digital information stored on a computer for use as evidence in civil, criminal, or administrative cases.

true

55
New cards

The law of search and seizure protects the rights of all people, excluding people suspected of crimes.

false

56
New cards

The purpose of an affidavit is to provide facts in support of evidence of a crime to submit to a judge when requesting a search warrant. True or False?

true

57
New cards

What is NOT true about the necessary components of a search warrant?

a search warrant cannot limit the scope of what can be seized.

58
New cards

Which of the following item should not be on an evidence custody form.

- Location where evidence was obtained

-Description of the evidence

-Nature of the case

-Case number

-None

-Name of the investigator assigned to the case

None

59
New cards

In a standard risk assessment, you list problems that might happen when conducting an investigation, which can help in planning your case. True or False?

true

60
New cards

For digital evidence, an evidence bag is typically made of antistatic material. True or False?

false

61
New cards

Evidence media should be write-protected to make sure data isn't altered. True or False?

true

62
New cards

The items such as an explanation of basic computer and network processes, a narrative of what steps you took, a description of your findings, and log files generated from your analysis tools, should be in your case report. True or False?

true

63
New cards

To improve your work, you should always critique your case after it's finished. True or False?

true

64
New cards

Police in the United States must use procedures that adhere to which of the following?

fourth amendment

65
New cards

A list of people who have had physical possession of the evidence is called chain of custody. True or False?

true

66
New cards

The triad of computing security includes ...

vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation

67
New cards

The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas different from your own specialties in case you need help on an investigation. True or False?

true

68
New cards

Policies can address rules for which of the following?

-When you can log on to a company network from home.

- The amount of personal e-mail you can send.

- The internet sites you can or cannot access

Any of these options

69
New cards

Statements that the organization has the right to monitor what users do that should appear on a warning banner. True or False?

true

70
New cards

Fraud, embezzlement, insider trading, espionage, and e-mail harassment are the types of digital investigations typically conducted in a business environment. True or False?

true

71
New cards

Professional conduct include:

ethics, morals, and standards of behavior.

72
New cards

An employer can be held liable for e-mail harassment. True or False?

true

73
New cards

At what distance can the EMR from a computer monitor be picked up?

1/2 mile

74
New cards

At what location does the forensics investigator conduct investigations, store evidence, and do most of his or her work?

the digital forensics lab

75
New cards

How frequently does IACIS require recertification to demonstrate continuing work in the field of computer forensics?

every 3 years

76
New cards

In addition to FAT16, FAT32, and Resilient File System, which file system can Windows hard disks also use?

NTFS

77
New cards

Methods for restoring large data sets are important for labs using which type of servers?

RAID

78
New cards

What is the maximum amount of time computing components are designed to last in normal business operations?

36 months

79
New cards

What material is recommended for secure storage containers and cabinets?

steel

80
New cards

What type of plan specifies how to rebuild a forensic workstation after it has been severely contaminated by a virus from a drive you're analyzing?

disaster recovery

81
New cards

A forensics analysis of a 6 TB disk, for example, can take several days or weeks.

true

82
New cards

By using marketing to attract new customers or clients, you can justify future budgets for the lab's operation and staff.

true

83
New cards

Computing systems in a forensics lab should be able to process typical cases in a timely manner.

true

84
New cards

If damage occurs to the floor, walls, ceilings, or furniture on your computer forensics lab, it does not need to be repaired immediately.

false

85
New cards

What items should you research before enlisting in a certification program?

acceptability in your chosen area of employment, requirements, and the costs

86
New cards

Large digital forensics labs should have at least two exits. True or False?

true

87
New cards

Typically, a regional lab has a separate storage area or room for evidence. True or False?

true

88
New cards

A forensic workstation should always have a direct broadband connection to the Internet. True or False?

false

89
New cards

Which organization provides good information on safe storage containers?

NISPOM

90
New cards

Which organization has guidelines on how to operate a digital forensics lab?

ASCLD

91
New cards

TEMPEST is the term refers to labs constructed to shield EMR emissions. True or False?

true

92
New cards

Building a business case can involve which of the following?

testing software, protecting trade secrets, and procedures for gathering evidence

93
New cards

The manager of a digital forensics lab is responsible for which of the following?

knowing the lab objectives, making necessary changes in lab procedures and software, and ensuring that staff members have enough training to do the job

94
New cards

Your business plan include ...

what OSs your lab commonly examines, why you need certain software, physical security items, how many machines are needed, how your lab will benefit the company

95
New cards

To maintain the chain of custody and prevent data from being lost, corrupted, or stolen, you have to have a secure digital forensics labs. True or False?

true

96
New cards

The main goal of a static acquisition is preservation of digital evidence. True or False?

true

97
New cards

In addition to md5sum, which hashing algorithm utility is included with current distributions of Linux?

sha1sum

98
New cards

What command displays pages from the online help manual for information on Linux commands and their options?

man

99
New cards

What did Microsoft add to its newer operating systems that makes performing static acquisitions more difficult?

whole disk encryption

100
New cards

What is the most common and flexible data-acquisition method?

disk-to-image file copy