Computer Forensics ll Final Flash Cards

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:18 PM on 5/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

50 Terms

1
New cards

Sector

Smallest addressable unit of storage on a disk.

2
New cards

Cluster

Group of sectors; smallest unit used by OS to store files

3
New cards

Slack Space

Unused space within a cluster that may contain leftover data.

4
New cards

Unallocated Space

Space not assigned to any file; deleted data may still exist

5
New cards

File Header (Signature)

First bytes of a file identifying its type

6
New cards

Metadata

data about a file (date created, modified, author).

7
New cards

Bitmap (Raster)

Made of pixels; loses quality when enlarged.

8
New cards

Vector

Uses math formulas; scales without losing quality

9
New cards

Metafile

Combination of bitmap and vector.

10
New cards

Common formats of Graphic File Types

JPG, PNG, GIF, BMP, TIFF

11
New cards

Lossless Compression

No data lost (exp. ZIP).

12
New cards

Lossy Compression

Data permanently removed (exp. JPEG).

13
New cards

File Carving

Recovering files using headers and footers.

14
New cards

Fragmentation

Files stored in multiple locations

15
New cards

Rebuilding headers

Fix damaged files using hex editors

16
New cards

Scope creep

Investigation expands beyond original goal

17
New cards

Common algorithms:

MD5, SHA-1.

18
New cards

Same hash =

file unchanged; different hash = file modified

19
New cards

Autopsy

Disk analysis and file recovery.

20
New cards

Wireshark:

Network traffic analysis

21
New cards

WinHex

Hex editing and analysis

22
New cards

Snort

Intrusion detection system.

23
New cards

What are types of data hiding techniques

Changing file extensions;Hidden files and partitions;Slack space hiding;Encryption and bit shifting; Investigators must detect hidden data

24
New cards

Steganography

Hiding data inside another file (exp. images)

25
New cards

Types of Steganography

Insertion (adds data), Substitution (replaces bits)

26
New cards

Detection Clues for Steganography

file size changes, duplicate files, unusual patterns

27
New cards

Brute Force

tries all combinations

28
New cards

Dictionary Attack

uses common words

29
New cards

Rainbow Tables

precomputed hashes for fast cracking

30
New cards

DDoS

multiple systems flood a target

31
New cards

Zero-day

exploits unknown vulnerabilities

32
New cards

Honeypot

fake system to attract attackers

33
New cards

Honeywall

monitors attacker activity

34
New cards

What is Honeypots & Monitoring

Used to study attack behavior.

35
New cards

Examples of File Struction & Identification

JPEG header = FFD8

36
New cards

What type of files commonly store EXIF metadata?

Image files (JPEG/TIFF)

37
New cards

What information can EXIF metadata reveal?

Camera type, date, time, and location

38
New cards

Why is metadata important in investigations?

It provides valuable evidence and information

39
New cards

What does compression do?

Reduces file size

40
New cards

Where do recovered files come from

unallocated space or slack space.

41
New cards

What does Hex Editors allow

viewing raw binary data

42
New cards

What does hexidecimal analysis do

Used to analyze, repair, and investigate files

43
New cards

What do Investigators do with Hexadecimal Analysis

Investigators compare known header values to identify file types.

44
New cards

Steps of Digital Forensics Process

Plan → Collect → Document → Analyze → Recover → Report

45
New cards

What does Hashing do

creates a digital fingerprint of a file

46
New cards

What is Hashing & Validation used for

Used to verify data integrity

47
New cards

What does Network Forensics Do?

Explain network forensics, difference from computer forensics, its purpose; Analyzing network traffic to investigate incidents;Helps determine how an attack occurred;Network logs record activity and events.

48
New cards

What are the three components of Defense in Depth?

People, Technology, Operations

49
New cards

Which of the following is considered a network vulnerability?

Open ports and misconfiguration

50
New cards

What is the purpose of packet analyzers?

To capture and analyze network traffic