ITN 276 final exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/120

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

121 Terms

1
New cards

the passphrase needed to connect tot a WI-FI network on a windows computer is stored in the windows registry ?

true

2
New cards

Steven is a forensic examiner. he is interested in examining the pictures across all user profiles to look for evidence of malicious activity. where should he begin his search for these files?

C:\Users

3
New cards

in windows 10 the recycle bin is located in a hidden directory .

true

4
New cards

someone has a attempted to gain unauthorized access to data files on Robert's machine. hw would like to investigate if any forensic evidence has been left behind. of the following where should Robert start search ?

event viewer security log.

5
New cards

in windows the system resource usage monitor (SRUM) database collects data on executables.

true

6
New cards

some malware on windows computers can modify the windows registry.

true

7
New cards

during the boot process of a windows computer the NTLDR must begin loading file system drives before the master boot record (MBR) can pas control to the boot sector on the boot partition .

false

8
New cards

regarding the windows boot process the term power- on self-test (POST) refers to a brief hardware test thta the basic input/output system (BIOS) performs upon boot-up

true

9
New cards

what s the definition of "stack"(S) ?

memory that is allocated based on the last-in -out (LIFO) principle

10
New cards

A ---------- is a software program thta appears to be a physical computer and executes programs as if it were a physical computer.

virtual machine

11
New cards

when performing volatile data analysis , you must compute the hash before and after completing memory capture

false

12
New cards

--------- is a windows file that is an interface for hardware.

Hal.dll

13
New cards

in windows when copying or cutting a file to a different partition the file will retain the rights of the source folder.

false

14
New cards

windows registry keys contain an associated value called LastWriteTime which is similar to the datestamp on file or folder

false

15
New cards

volume shadows copy (VSS) is a windows service related to backups.

true

16
New cards

in windows file permissions never change when moving a file.

false

17
New cards

a suspect erased their browsing history on their computer. the computer has Microsoft internet explorer installed. the forensic investigator must retrieve recently visited web addresses and recently opened files. what should the investigator do ?

download a tool that allows for retrieval and review of index.dat file.

18
New cards

the --------- file is responsible for managing services on a windows computer.

Smss.exe

19
New cards

when a windows computer connects to a wireless network the service set identifier (SSID) is logged as a preferred network connection and can be found in the windows registry.

true

20
New cards

a hacker installed an application on a computer to recover deleted files and then uninstalled the application to hide her tracker . where would a forensic examiner most likely find evidence that the application was once installed ?

HKLM\Software

21
New cards

open -source software means that the source code is available for anyone who wants to modify ,repackage and distribute it .

true

22
New cards

Lin is a Linux administrator .she is performing routine maintenance on a server .she wants to view various disk partitions to see information such as the disk size ,device ,block and file systems .which command must Lin issue in the shell?

fdisk

23
New cards

which linux shell command lists various partitions ?

frisk

24
New cards

GNOME is a graphical user interface for linux

true

25
New cards

the Berkeley fast file system is also know as the Reiser file system.

false

26
New cards

Tmpfs is a linux file system whose contents reside only in memory

true

27
New cards

during the linux boot process during the kernel stage the system switches the cpu from ------------ to -------------

real mode , protected mode

28
New cards

which linux shell command delete or removes file ?

rm

29
New cards

your are a forensic specialist learning about the Linux operating system . as the system boots message display on the Linux boot screen .however the message scroll to quickly for you to read what command can you use after the machine is completely booted to read the boot message ?

dmesg

30
New cards

in linux a partition is data structure in the file system that stores all the information about a file expect its name and its actual data .

false

31
New cards

the linux who command returns information regarding a specific user .

false

32
New cards

the linux dmesg command enables you to view a log

true

33
New cards

The linux ---------- file is where the boot-up process and operation are set . it contains enters such as label , run _level process and boot.

/etc/inittab

34
New cards

what is a modern and widely used Linux boot loader ?

GRUB

35
New cards

in linux the grep command is used to invoke super - user mode

false

36
New cards

in linux the /var/log/lpr.log is the printer log

true

37
New cards

the linux EXt4 file system can support single files up to terabytes in size .

true

38
New cards

in linux the process of routing a drive involves the operating system accessing the drive and loading it into memory.

true

39
New cards

in a linux directory what circumstance must occur for a file to be deleted?

the inode link count must reach zero

40
New cards

in linux as with Windows the ----------is the first sector on any disk

boot sector

41
New cards

In the HFS+ file system aliases allow you to have multiple references to a single file or directory

true

42
New cards

wishing the HFS+ file system what allows you to have multiple references to a single file or directory ?

aliases

43
New cards

a MAC OS user moves 12 critical files to their trash folder and the empties the trash folder how can you recover these files for analysis ?

leverage third -party software to recover the files .

44
New cards

the /Library/Preferences/SytemCongiguration/dom.apple.preference file contains the network configuration data for each network card.

True

45
New cards

you need to review the swap file on an Apple computer .where is the swap file Located ?

/var/vm

46
New cards

MAC OS Hierarchical File System Plus (HFS+) performs defragmentation on a per-file basis

true

47
New cards

in Mac OS the -------- folder contains information about system and software updates.

/Library/Receipts

48
New cards

in MAC OS the -------- directory contains information about servers network libraries and network properties.

/network

49
New cards

when performing forensics on a a Apple computer what operation system are you the most likely to encounter ?

MAC OS

50
New cards

what feature that was first released with MAC OSX 10.20 potentially allows evidence related to a cell phone to be found on a MAC OS computer ?

Handoff

51
New cards

when a file is deleted on Ana HFS or HFS+ volume the references to the file are gone and the clusters may be used and overwritten.

true

52
New cards

you need to examine an Apple device and do not have the password .what is the correct sequence of action to take to obtain the password?

Enter Recovery Mode, launch Disk Utility, disable System Integrity Protection, export the plist file, convert the file to a text format, and then run the file though a hash utility.

53
New cards

Melissa is beginning an investigation of an older Apple computer .she wants to determine when the system volumes were created .what is the best way for her to approach discovering this data ?

Examine the volume header in the third section (section 2) of the volum

54
New cards

You are investigating a criminal case. The suspect has been accused of stealing crucial industry data from his workplace after being fired. His Apple computer has been brought to you to see if the stolen data may have been transferred onto the machine. Which log directory is the most critical and should be reviewed first?

/var/log

55
New cards

in MAC OS the /etc directory contained information about system and software updates

fasle.

56
New cards

in Mac OS the ------- hell command returns the hardware information for the host system . this provides information useful for the basic documentation of the system prior to beginning you forensic examination.

system_profiler SPHardwareDataType

57
New cards

n Mac OS the -------- directory contains information about mounted devices

/volumes

58
New cards

Because time is sometimes critical to a case, a digital forensic examiner does not always need prior authorization to access a computer to check for evidence.

false

59
New cards

in Mac OS the --------- shell command lists the current device files that are in use.

ls/dev/disk?

60
New cards

Priyanka is a forensic investigator. She is at an office where a Macintosh computer was used in a suspected crime. The computer is still running. Priyanka wants to image the disk before transporting the computer to the forensic lab. She also wants to avoid accidentally altering information on the computer's hard disk. What should she do first?

put the computer in Target Disk Mode.

61
New cards

You are a forensic investigator researching an email sent for malicious intent. The sender used an email web service to transmit the message. The receiver also used an email web service. Both the sender and receiver deleted the message and then deleted the message from their trash folders. What is your only possible option to recover the email?

Issue a subpoena to the service provider and possibly recover the message from a backup.

62
New cards

email tracing involves examine email header information to look for clues about where a message has been.

true

63
New cards

what is one advantage the IMAP email protocol has over the POP3 email protocol?

IMAP allows the client to download only the email headers, so that the user can choose which messages are to be downloaded completely.

64
New cards

email programs use different emails formats depending on the operating system upon which they run.

false

65
New cards

You are a forensic investigator. You are gathering evidence regarding an email used for malicious purposes. You must present the full data from the email header in order to show from which IP address it originated. How will you read the full header?

you can view the full header by using tools in the email client

66
New cards

what email header filed includes tracking information generated by mail servers that have previously handled a message in reverse order?

received

67
New cards

A WHOIS database contains information on internet protocol (IP) address registration

true

68
New cards

Which law includes the following text? "Whoever knowingly uses a misleading domain name on the internet with the intent to deceive a person into viewing material constituting obscenity shall be fined under this title or imprisoned not more than 2 years, or both."

18 U.S.C. 2252B

69
New cards

what is a wiretapping law passed in 1994 that allows law enforcement to lawfully conduct electric surveillance ?

The Communication Assistance to Law Enforcement Act (CALEA)

70
New cards

If an internet service provider (ISP) or any other communications network stores an email, retrieval of that evidence must be analyzed under __, which creates statutory restrictions on government access to such evidence from ISPs or other electronic communications service providers.

the Electronic Communications Privacy Act (ECPA)

71
New cards

the standard for email format including headers is RFC 2822.

true

72
New cards

per roc 2822 an email message header must including the form filed and the data filed.

true

73
New cards

You are a forensic investigator. You are looking for clues about where an email message has been. This is a frequent task you perform. You often use audits and paper trails of email traffic as evidence in court and sometimes network tracing tools. Which task are you performing?

email tracing

74
New cards

secure versions of email protocols are encrypted with transport layer security (TLS)

true

75
New cards

files with pst extensions belong to which email client ?

microsoft outlook

76
New cards

You are investigating an email reported by a client as malicious. The email came from a known source, passed all validity checks, and originated from a mail server not blacklisted by any blacklist service. However, the message was short and contained a link that, when clicked, loaded malicious software onto the client's server. What form of email faking are you looking at?

valid emails

77
New cards

once you receive an email it not longer on the sending server.

false

78
New cards

the secure version of simple mail transfer protocol (SMTP) is SMPTS

true

79
New cards

the tracers command provides reliable routing information for an email ?

fasle

80
New cards

Microsoft exchange is an email server program

true.

81
New cards

the iPhone routinely auto-sync when connected to a computer

true

82
New cards

The National Institute of Standards and Technology (NIST) list four different states a mobile device can be in when you extract data. The __ state is reached by a timer, which is triggered after a period of inactivity, allowing battery life to be preserved by dimming the display and taking other appropriate actions.

demi-active

83
New cards

the -------- is a set radio transceiver equipment that enables communication between cellular devices and the mobile switching center(MSC)

base station system (BSS)

84
New cards

in a cellular network the --------- database contains subscriber data and service information for roaming phones.

visitor location register (VLR)

85
New cards

the ---------- is a unique identification number for identifying code division multiple access (CDMA) cell phones.

electronic serial number (ESN)

86
New cards

to extract data from a Android phone an examiner can use the ADB (Android Debugging Bridge ) shell

true

87
New cards

what term scribes a small ,electronic card that is intended to identify a cellular phone ?

subscriber identity module (SIM)

88
New cards

Bill is a forensic specialist. He is preparing instructions for how to seize evidence from mobile devices. One of the rules is to make sure the examiner does not write to the device. Which of the following would ensure that an examiner does not write to the device when connecting it to a Windows computer?

On the Windows computer, set the HKEYLOCALMACHINE\System\CurrentControlset\StorageDevicePolicies Windows Registry key value to 0x00000001.

89
New cards

criminals cannot typically access system data in IOS 14

true

90
New cards

The National Institute of Standards and Technology (NIST) list four different states a mobile device can be in when you extract data. In the __ state, a device is powered on, performing tasks, and able to be customized by the user and have its file system populated with data.

active

91
New cards

--------- occurs when a SIM card's identifying information is copied to a different SIM card.

SIM cloning

92
New cards

various releases or versions of Android have beeb need after wild animals

false

93
New cards

in a cellular network the -------- is a central controller coordinating the other pieces of the base station system (BSS)

base nation controller (BNC)

94
New cards

the --------- standard for wireless communication of high speed data for mobile devices is commonly called 4G

Long term evolution (LTE)

95
New cards

there are numerous codes you can enter on an Android keypad such as *#06# for the IMEI number to get bits of information during forensic examination

96
New cards

most mobile devices are able to connect to --------- networks which have become the norm and are found freely available in restaurants coffee shops sites home and many other locations.

WI-FI

97
New cards

to be considered 4G a wireless communication technology must have a speed of 100 megabits per second (MPS)for stationary users

false

98
New cards

due to their increased bandwidth ---------- networks are expected to save mobile devices just like any other cellular network but also be used as general internet service providers (ISPs)

5G

99
New cards

to extract data from an Android phone or tablet it must be in user mode

false

100
New cards

Maria is a forensic specialist she is examine an android mobile device for evidence of a Crime . in which of the following partitions is Maria most likely to find forensically important data?

user data partition