CPSC 333 Ch 6

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:20 AM on 4/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

41 Terms

1
New cards

What type of tools range from simple, single-purpose components to complete computer systems and servers?

Hardware forensic tools

2
New cards

What type of tools are commonly used to copy data from a suspect’s disk drive to an image file?

Software forensic tools

3
New cards

What are the two types of software forensic tools?

-Command-line applications

-GUI applications

4
New cards

What are the five major categories of tasks performed by digital forensic tools?

-Acquisition

-Validation and verification

-Extraction

-Reconstruction

-Reporting

AVERR

5
New cards

Making a copy of the original drive is performing an ________?

Acquisition

6
New cards

What are the two types of data copying methods used in software acquisitions?

-Physical copying of the entire drive

-Logical copying of a disk partition

7
New cards

True or false: Remote acquisitions are more common in larger organizations?

True

8
New cards

A way to confirm that a tool is function as intended is ______?

Validation

9
New cards

Proving that two sets of data are identical by calculating hash values or using another similar method is _______?

Verification

10
New cards

What are the subfunctions of validation and verification?

-Hashing

-Filtering

-Analyzing file headers

11
New cards

What task is known as the recovery task in a digital investigation, often the most challenging task to master?

Extraction

12
New cards

What is the first step in analyzing an investigation’s data?

Recovering data

13
New cards

What subfunction of extraction can speed up analysis for investigators?

Keyword searching

14
New cards

When an investigator has to deal with encrypted files and systems, password recovery tools have a feature to generate potential passwords known as ___________?

password dictionary attack

15
New cards

If a password dictonary attack fails during the attempt to recover encrypted files, a ___________ is ran instead.

Brute force attack

16
New cards

What task recreates a suspect drive to show what happened during a crime or an incident?

Reconstruction

17
New cards

Disk to disk copy, image to disk copy, image to partition copy, and disk to image copy are all methods of ______?

Reconstruction

18
New cards

What is the simplest method when reconstructing an image of a suspect drive?

Use a tool that makes a direct disk to image copy

19
New cards

Linux dd command, ProDiscover, and Voom Technologies Shadow Drive are all examples of ____?

disk to image copies

20
New cards

To perform a forensics disk analysis and examination, you need to create a ____?

Report

21
New cards

Bookmarking or tagging, log reports, timelines, and report generators are all subfunctions of the _______ task?

Reporting

22
New cards

What was one of the first MS-DOS tools used for computer investigations?

Norton DiskEdit

23
New cards

______ has been mostly replaced by Linux?

UNIX

24
New cards

What is the digital forensics tool that is built specifically for the Linux environment?

SMART

25
New cards

What is one of the easiest forensic suites to use that can be booted as a Linux OS or loaded directly onto a running system for live acquisition?

Helix 3

26
New cards

What was Kali Linux formally known as?

BackTrack

27
New cards

Sleuth Kit is a _____ forensics tool?

Linux

28
New cards

Forcepoint Threat Protection, formally known as Second Look, is a Linux ___ _____ tool, that can perform both onsite and remote memory acquisitions

Memory analysis

29
New cards

What are the advantages of using a GUI forensic tool?

-Ease of use

-Multitasking

-No need for learning older OS’s

30
New cards

What are the disadvantages to using GUI forensic tools?

-Excessive resource requirements

-Produce inconsistent results

-Creates tool dependencies

31
New cards

What factors should you consider when planning your budget?

-expected amount of time forensic workstation will run

-failures

-consultant and vendor fees

-anticipate equipment replacement

32
New cards

What are the three types of forensic workstations?

-stationary workstation

-portable workstation

-lightweight workstation

33
New cards

True or false: Private corporation labs only handle system types used in the organization?

True

34
New cards

What prevents data writes to a hard disk?

Write-blocker

35
New cards

Where to software enabled blockers usually run?

In shell mode (Windows CLI)

36
New cards

True or false: If there is a limited budget for a forensic workstation, a high end game PC would work?

True

37
New cards

Who plays a large role in the forensics field by publishing articles, providing tools, and creative procedures for testings and validating forensics software?

National Institute of Standards and Technology (NIST)

38
New cards

The National Software Reference Library, created by NIST, helps collect known ____ ____ for commercial software apps and OS files, helps filter ___ ____, and uses RDS to locate bad files

hash values, known information

39
New cards

True or false: You don’t need to perform the same tasks with different tools to verify your results?

False

40
New cards

_____ editors are reliable tools that can access raw data?

Disk

41
New cards

True or false: If you find a problem, you should report to the vendor and use it after you report the issue

False

Explore top flashcards

flashcards
Cô Yến 5/12/2024
22
Updated 480d ago
0.0(0)
flashcards
EXAM 2 - part 6
22
Updated 250d ago
0.0(0)
flashcards
Einheit 1 Freunde
75
Updated 229d ago
0.0(0)
flashcards
Biology Honors Evolution
51
Updated 1096d ago
0.0(0)
flashcards
Matiekos egzas
73
Updated 819d ago
0.0(0)
flashcards
Livy 2.10 Vocab
20
Updated 1215d ago
0.0(0)
flashcards
Cô Yến 5/12/2024
22
Updated 480d ago
0.0(0)
flashcards
EXAM 2 - part 6
22
Updated 250d ago
0.0(0)
flashcards
Einheit 1 Freunde
75
Updated 229d ago
0.0(0)
flashcards
Biology Honors Evolution
51
Updated 1096d ago
0.0(0)
flashcards
Matiekos egzas
73
Updated 819d ago
0.0(0)
flashcards
Livy 2.10 Vocab
20
Updated 1215d ago
0.0(0)