Module 04 - Data Acquisition Fundamentals

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:53 PM on 4/8/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

56 Terms

1
New cards

What is the first proactive step in the forensic investigation process?

Data acquisition

2
New cards

Through ___________, investigators aim to extract every bit of information present in the victim system’s memory and storage, in order to create a forensic copy of this information.

Forensic data acquisition

3
New cards

To perform a forensic examination on a potential source of evidence, the first step is to _________________________

Create a replica of the data residing on the media found in the crime scene such as a hard disk or any other digital storage device.

4
New cards

What is a process of imaging or collecting (acquiring) information using established methods from various media according to certain standards for their forensic value?

Forensic data acquisition

5
New cards

What is the use of established methods to extract (acquire) Electronically Stored Information (ESI) from suspect computer or storage media to gain insight into a crime or an incident?

Forensic data acquisition

6
New cards

True or False: Investigators need to ensure that the acquisition methodology used is forensically sound. Specifically, the acquisition methodology adopted must be verifiable and repeatable.

True

7
New cards

True or False: A fundamental factor to consider in the acquisition of forensic data is time.

True

8
New cards

While data in some sources such hard drives remain unaltered and can be collected even after the system is shut down, data in some sources such as the RAM are highly volatile and dynamic and must therefore be collected in _________

Real-time

9
New cards

True or False: Data acquisition can be either categorized as live data acquisition or dead data acquisition.

True

10
New cards

What data is acquired from a computer that is already powered on (either locked or in sleep mode)? This enables the collection of volatile data that are fragile and lost when the system loses power or is switched off. Such data reside in registries, caches, and RAM.

Live data acquisition

11
New cards

_________ such as that in RAM are dynamic and change rapidly, and therefore must be collected in real-time.

Volatile data

12
New cards

_________ nonvolatile data that remains unaltered in the system even after shutdown is collected.

Dead or static data acquisition

13
New cards

What allows Investigators to recover such data from hard drives as well as from slack space, swap files, and unallocated drive space?

Dead or static data acquisition

14
New cards

True or False: Other sources of non-volatile data include CDROMs, USB thumb drives, smartphones, and PDAs.

True

15
New cards

Investigators must be able to verify the accuracy of acquired data, and the complete ______________

Process should be auditable and acceptable in the court

16
New cards

What involves the collection of volatile data from devices when they are live or powered on. Volatile information, as present in the contents of RAM, cache, DLLs, etc. is dynamic, and is likely to be lost if the device to be investigated is turned off. It must therefore be acquired in real time?

Live data acquisition

17
New cards

Examination of _________ assists in determining the logical timeline of a security incident and the users that are likely to be responsible for it.

Volatile information

18
New cards

What can then be followed by static/dead acquisition, where the investigator shuts down the suspect machine, removes the hard disk, and then acquires its forensic image?

Live acquisition

19
New cards

What can help investigators obtain information even if the data of evidentiary value is stored on the cloud using a service such as Dropbox or Google Drive?

Live data acquisition

20
New cards

True or False: Investigators can also acquire data from unencrypted containers or disks that are open on the system and are automatically encrypted when the system shuts down.

True

21
New cards

True or False: If the suspect has attempted to overwrite data on the physical hard disk to avoid detection, there is a possibility that investigators can find traces of such overwritten data by examining the RAM content.

True

22
New cards

Volatile has two types. Which of the following is one of the two types?

System data

23
New cards

Volatile has two types. Which of the following is one of the two types?

Network data

24
New cards

What is the information related to a system, which can serve as evidence in a security incident?

System data

25
New cards

What information includes the current configuration and running state of the suspect computer?

System data

26
New cards

What includes system profile (details about configuration), login activity, current system date and time, command history, current system uptime, running processes, open files, startup files, clipboard data, users logged in, DLLs, and shared libraries?

System data

27
New cards

What includes critical data stored in the slack spaces of the hard disk drive?

System data

28
New cards

What is the network-related information stored in the suspect system and connected network devices?

Network data

29
New cards

What includes open connections and ports, routing information and configuration, ARP cache, shared files, and services accessed?

Network data

30
New cards

What can help investigators obtain data from unencrypted containers or disks that are open on the system, which are automatically encrypted when the system shuts down?

Live acquisition

31
New cards

What can help investigators find private browsing history and data from remote storage services such as Dropbox (cloud service) by examining the random-access memory (RAM)?

Live acquisition

32
New cards

When collecting evidence, an investigator needs to evaluate the _________ of data depending on the suspect machine and the situation.

Order of volatility

33
New cards

According to the RFC 3227, which of the following is the Guidelines for Evidence Collection and Archiving?

1.) Registers and processor cache, 2). Routing table, process table, kernel statistics, and memory, 3). Temporary system files, 4). Disk or other storage media, 5). Remote logging and monitoring data related to the target system, 6). Physical configuration and network topology, 7). Archival media

34
New cards

Per the RFC 3227 Guidelines for Evidence Collection and Archiving, which of the following information in the registers or the processor cache on the computer exists for nanoseconds and is constantly changing and can be classified as the most volatile data?

Registers, processor cache

35
New cards

Per the RFC 3227 Guidelines for Evidence Collection and Archiving, which of the following has the routing table, ARP cache, and kernel statistics reside in the ordinary memory of the computer? These are slightly less volatile than the information in the registers, with a life span of about ten nanoseconds

Routing table, process table, kernel statistics, and memory

36
New cards

Per the RFC 3227 Guidelines for Evidence Collection and Archiving, which of the following tend to persist for a longer time on the computer compared to routing tables and ARP caches? These systems are eventually overwritten or changed, sometimes in seconds or minutes later.

Temporary system files

37
New cards

Per the RFC 3227 Guidelines for Evidence Collection and Archiving, which of the following consists of anything stored on a disk stays for a while. However, sometimes due to unforeseen events, these data can be erased or overwritten. Therefore, disk data may also be considered somewhat volatile, with a lifespan of some minutes.

Disk or other storage media

38
New cards

Per the RFC 3227 Guidelines for Evidence Collection and Archiving, which of the following involves data that passes through a firewall cause a router or switch to generate logs? The system might store these logs elsewhere. These logs may overwrite themselves within an hour, a day, or a week. However, these are generally less volatile data.

Remote logging and monitoring data related to the target system

39
New cards

Per the RFC 3227 Guidelines for Evidence Collection and Archiving, which of the following are less volatile and have a longer life span than some other logs?

Physical configuration and network topology

40
New cards

Per the RFC 3227 Guidelines for Evidence Collection and Archiving, which of the following involves a DVD-ROM, a CD-ROM, or a tape contains the least volatile data because the digital information does not change in such data sources automatically unless damaged under a physical force?

Archival media

41
New cards

What refers to nonvolatile data, which does not change its state even after the system is shut down?

Static data

42
New cards

What refers to the process of extracting and gathering these data in an unaltered manner from storage media?

Dead acquisition

43
New cards

Which of the following are sources of nonvolatile data?

Hard drives, DVD-ROMs, USB drives, flashcards, smart-phones, and external hard drives.

44
New cards

What type of data exists in the form of emails, word processing documents, web activity, spreadsheets, slack space, swap files, unallocated drive space, and various deleted files?

Dead acquisition

45
New cards

Which of the following allows investigators to repeat the dead acquisition process on well-preserved disk evidence?

Temporary (temp) files

46
New cards

Which of the following allows investigators to repeat the dead acquisition process on well-preserved disk evidence?

System registries

47
New cards

Which of the following allows investigators to repeat the dead acquisition process on well-preserved disk evidence?

Event/system logs

48
New cards

Which of the following allows investigators to repeat the dead acquisition process on well-preserved disk evidence?

Boot sectors

49
New cards

Which of the following allows investigators to repeat the dead acquisition process on well-preserved disk evidence?

Web browser cache

50
New cards

Which of the following allows investigators to repeat the dead acquisition process on well-preserved disk evidence?

Cookies and hidden files

51
New cards

True or False: Investigators must never perform a forensic investigation or any other process on the original evidence or source of evidence, as it may alter the data and render the evidence inadmissible in the court of law.

True

52
New cards

Investigators can create a ________ of a suspicious drive or file to view the static data and analyze it. This practice not only preserves the original evidence, but also provides the option to recreate a duplicate if something goes wrong.

Duplicate bit-stream image

53
New cards

Why is it essential to produce two copies of the original media before starting the investigation process?

One copy is used as a working copy for analysis

54
New cards

Why is it essential to produce two copies of the original media before starting the investigation process?

The second copy is the library/control copy stored for disclosure purposes or, to be used if the working copy becomes corrupted.

55
New cards

Why is it essential to produce two copies of the original media before starting the investigation process?

If the investigators need to perform drive-to-drive imaging, they can use blank media to copy into shrink-wrapped new drives.

56
New cards

Why is it essential to produce two copies of the original media before starting the investigation process?

After duplicating the original media, investigators must verify the integrity of copies by comparing them to the original using hash values such as MD5.