Deck 3: Tools, Environments, Equipment, and Certifications
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
Play
Full screen (f)
Deck 3: Tools, Environments, Equipment, and Certifications
1
If you need to remove a password from files,you could use a program such as
A)Jack the Cracker
B)WinHex
C)MacQuisition
D)John the Ripper
A)Jack the Cracker
B)WinHex
C)MacQuisition
D)John the Ripper
D
2
Preserving e-evidence and good ________ of steps taken during the investigation are essential for success in computer crime cases.
documentation
3
Under no circumstances should you attempt to create a forensically clean drive by simply ________ the drive.
formatting
4
A defensible approach is an objective and unbiased approach that
A)Is performed in accordance with forensic science principles
B)Is conducted with verified tools
C)Is documented thoroughly
D)All the above
A)Is performed in accordance with forensic science principles
B)Is conducted with verified tools
C)Is documented thoroughly
D)All the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
The current best approach to powering down a suspect PC is to
A)Simply power it down using the operating system
B)Keep it running on an UPS
C)Don't power it down
D)Pull the power plug
A)Simply power it down using the operating system
B)Keep it running on an UPS
C)Don't power it down
D)Pull the power plug
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
Documentation of the evidence can include which of the following?
A)Name of the suspect's supervisor
B)Status of the computer
C)Name of the investigating officer
D)All the above
A)Name of the suspect's supervisor
B)Status of the computer
C)Name of the investigating officer
D)All the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following tasks should be performed to maximize search results?
A)Confirm the objective of the investigation.
B)Identify relevant time periods.
C)Identify relevant types of data.
D)All are correct.
A)Confirm the objective of the investigation.
B)Identify relevant time periods.
C)Identify relevant types of data.
D)All are correct.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is the preferred way to make a forensic copy?
A)Create a mirror image.
B)Produce a sector-by-sector copy.
C)Copy residual data only.
D)Make a back-up tape image.
A)Create a mirror image.
B)Produce a sector-by-sector copy.
C)Copy residual data only.
D)Make a back-up tape image.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
If volatile data must be acquired,you may need to do your analysis in a(n)
A)Trusted environment
B)Postmortem environment
C)Untrusted environment
D)Dead environment
A)Trusted environment
B)Postmortem environment
C)Untrusted environment
D)Dead environment
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following does NOT affect the choice of forensic tool(s)for a case?
A)The operating system
B)State of the data
C)Availability of an expert witness
D)Domestic and international laws
A)The operating system
B)State of the data
C)Availability of an expert witness
D)Domestic and international laws
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
To protect original data from any alteration,you
A)Use gloves when working with the hard drive
B)Make a forensic copy of the original data
C)Do your forensic work as quickly as possible
D)Use the operating system to copy all relevant files
A)Use gloves when working with the hard drive
B)Make a forensic copy of the original data
C)Do your forensic work as quickly as possible
D)Use the operating system to copy all relevant files
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
Which factor(s)determine the type of tools needed for an analysis?
A)The environment
B)The power sources available where the analysis will be done
C)The make of the equipment to be analyzed
D)None of the above
A)The environment
B)The power sources available where the analysis will be done
C)The make of the equipment to be analyzed
D)None of the above
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
________ data is data that has been deleted but not erased.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
When you forensically wipe a hard drive,you
A)Write over all areas of the disk with a single character
B)Reformat the hard drive using standard disk utilities
C)Delete all active data from the hard drive
D)Use a forensic tool to physically clean the hard drive
A)Write over all areas of the disk with a single character
B)Reformat the hard drive using standard disk utilities
C)Delete all active data from the hard drive
D)Use a forensic tool to physically clean the hard drive
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
When a copy is made,the contents of a hard drive are stored as a series of compressed ________ files.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
The first step in analyzing data is to _________ it.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following tools is designed for use with Linux systems?
A)BlackBag
B)WinHex
C)Autopsy
D)PDA Seizure
A)BlackBag
B)WinHex
C)Autopsy
D)PDA Seizure
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
A forensics lab should have all of the following applications on hand EXCEPT
A)Microsoft Office versions
B)ClarisWorks
C)Peachtree Accounting
D)Visual Basic
A)Microsoft Office versions
B)ClarisWorks
C)Peachtree Accounting
D)Visual Basic
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
Encase softwarecan be used for all e-mail investigations EXCEPT which of the following?
A)GoogleMail
B)Hotmail
C)Outlook
D)AOL
A)GoogleMail
B)Hotmail
C)Outlook
D)AOL
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
Data may be hidden by all of the following methods EXCEPT
A)Using special characters in the actual name
B)Renaming to a common name used by the operating system
C)Encrypting the file
D)Password-protecting the file
A)Using special characters in the actual name
B)Renaming to a common name used by the operating system
C)Encrypting the file
D)Password-protecting the file
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
You may need to do a(n)________ analysis during a hacker attack or other intrusion.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
A(n)________ can cause MD5 hashes to be different if different tools are used to acquire a disk image.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
________,from Paraben Forensics,is a comprehensive tool for investigating the contents of Palm Pocket PCs that run on Windows CE.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
________ is another name for the security key you need to access a system when using EnCase.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
A computer forensic specialist may examine the ________ to ascertain the true identity of a file.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
A forensics lab is typically considered to be a(n)________ environment.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
One ________ can be saved on numerous servers and be forwarded to a person unknown to its author.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
A drive image is "fingerprinted" using an encryption technique called ________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
________ data can include spreadsheets,databases,and word processing files.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
A dead analysis is also referred to as a(n)________ analysis.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck