Chapter 06: Current Digital Forensics Tools

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

When you research for computer forensics tools, strive for versatile, flexible, and robust tools that provide technical support. T/F

True

2
New cards

In software acquisition, there are three types of data-copying methods. T/F

False

3
New cards

To help determine which computer forensics tool to purchase, a comparison table of functions, subfunctions, and vendor products is useful. T/F

True

4
New cards

Computers used several OSs before Windows and MS-DOS dominated the market. T/F

True

5
New cards

After retrieving and examining evidence data with one tool, you should verify your results by performing the same tasks with other similar forensics tools. T/F

True

6
New cards

Software forensic tools are grouped into command-line applications and GUI applications. T/F

True

7
New cards

The validation function is the most challenging of all tasks for computer investigators to master. T/F

False

8
New cards

Although a disk editor gives you the most flexibility in testing, it might not be capable of examining a compressed file's contents. T/F

True

9
New cards

Because there are a number of different versions of UNIX and Linux, these OSs are referred to as CLI platforms. T/F

False

10
New cards

Hardware manufacturers have designed most computer components to last about 36 months between failures. T/F

False

11
New cards

Which digital forensics tool is categorized as a single-purpose hardware component?
a. Tableau T35es-R2 SATA/IDE eSATA bridge b. Safeback
c. Magnet Forensics AXIOM d. AccessData FTK

Tableau T35es-R2 SATA/IDE eSATA bridge

12
New cards

Where do software forensics tools copy data from a suspect's disk drive?
a. A backup file b. Firmware
c. An image file d. A recovery copy

An image file

13
New cards

Which tool enables the investigator to acquire the forensic image and process it in the same step?
a. Magnet DEFR b. Magnet FTK
c. Magnet dd d. Magnet AXIOM

Magnet AXIOM

14
New cards

What Linux command is used to create the raw data format?
a. rawcp b. dd
c. d2dump d. dhex

dd

15
New cards

Which activity involves sorting and searching through investigation findings to separate good data and suspicious data?
a. Validation b. Filtering
c. Acquisition d. Reconstruction

Filtering

16
New cards

Many password recovery tools have a feature for generating potential password lists for which type of attack?
a. Brute-force b. Password dictionary
c. Birthday d. Salting

Password dictionary

17
New cards

Which type of copy from the suspect disk to the target location does the simplest method of duplicating a disk drive make?
a. Partition-to-partition b. Image-to-partition
c. Disk-to-image d. Image-to-disk

Disk-to-image

18
New cards

What must be created to complete a forensic disk analysis and examination?
a. A forensic disk copy b. A risk assessment
c. A budget plan d. A report

A report

19
New cards

The first MS-DOS tools that analyzed and extracted data from floppy disks and hard disks were used with which type of PC file systems?
a. Apple b. Windows
c. UNIX d. IBM

IBM

20
New cards

In Windows 2000 and later, which command shows you the file owner if you have multiple users on the system or network?
a. dir b. ls
c. Copy d. owner

dir

21
New cards

Building your own forensics workstation:
a. is always less expensive than choosing a vendor-supplied workstation.
b. requires the time and skills necessary to support the chosen hardware.
c. is inappropriate in the private sector.
d. limits you to only one peripheral device per CPU because of potential conflicts.

requires the time and skills necessary to support the chosen hardware.

22
New cards

What do you call a forensics workstation consisting of a laptop computer with almost as many bays and peripherals as a stationary workstation?
a. A quasi-workstation b. A field workstation
c. A lightweight workstation d. A portable workstation

A portable workstation

23
New cards

What type of disk is commonly used with Sun Solaris systems?
a. F.R.E.D. b. SPARC
c. FIRE IDE d. DiskSpy

SPARC

24
New cards

What is the general term for software or hardware that is used to protect evidence disks by preventing data from being written to them?
a. Drive-protectors b. Disk-blockers
c. Data-protectors d. Write-blockers

Write-blockers

25
New cards

Devices used to prevent data from being written to a disk can connect to a computer through FireWire, SATA, PATA, and SCSI controllers as well as which other type of controller?
a. USB 2.0 and 3.0 b. IDE
c. LCD d. PCMCIA

USB 2.0 and 3.0

26
New cards

Which entity publishes articles, provides tools, and creates procedures for testing and validating computer forensics software?
a. CFTT b. NIST
c. FS-TST d. NSRL

NIST

27
New cards

Which standards document demands accuracy for all aspects of the testing process?
a. ISO 3657 b. ISO 5321
c. ISO 5725 d. ISO 17025

ISO 5725

28
New cards

Which NIST project manages research on forensics tools?
a. NSRL b. CFTT
c. FS-TST d. PARTAB

CFTT

29
New cards

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files?
a. MD5 b. SHA-1
c. CRC-32 d. RC4

SHA-1

30
New cards

Which type of tool can be used to compare results and verify a new tool by viewing data in its raw format?
a. A disk imager b. A write-blocker
c. A bit-stream copier d. A disk editor

A disk editor