Lesson 10 Flashcards

1
Q

The collection part of the computer forensic expert’s job includes all of the following EXCEPT:

A

Penning a written report of digital data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these is a component of the presentation portion of computer forensics?

A

Writing a comprehensive report of findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does computer forensics differ from traditional forensics?

A

It is focused solely on digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A computer forensic expert’s analysis should be all of these things EXCEPT:

A

Cursory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer forensic experts work with two primary types of data. What are they?

A

Computer forensic experts work to retrieve both visible and latent, or hidden, digital data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Missteps made in the _____ process can cause valuable evidence to be discarded or thrown out of court.

A

collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of these is a common tactic investigators use to preserve data during the digital forensics process?

A

They make copies of files or images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This stage of the digital forensics process touches all other stages in the process:

A

The documentation stage of the digital forensics process is a step performed throughout the investigation. This covers everything from how evidence is collected using a search warrant to how conclusions about that evidence are made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these might represent what the analysis stage of the digital forensics process entails?

A

Making conclusions about data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Before you can collect evidence in the digital forensics process, you must first work to _____ potential relevant sources.

A

identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not an EnCase certification track?

A

CFCE is not an EnCase certification track.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of digital forensic tools include _____.

A

Digital forensic tool examples: Disk Investigator, Digital Detective, EnCase, and ComputerCOP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Detective tool offers experts _____.

A

Digital detective offers no certification track.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ComputerCOP is particularly designed to address _____.

A

ComputerCOP is particularly designed to address child safety on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital Forensics entails _____.

A

the identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following best describes what data recovery is?

A

It refers to the act of recovering data which has been lost, corrupted, or deleted.

17
Q

Which of the following data recovery tools utilizes a system’s command prompt in order to operate?

A

TestDisk

18
Q

Which of the following best describes Guaranteed Recovery, a useful feature found in Disk Drill?

A

Guaranteed Recovery is a feature found in Disk Drill. It works by creating a copy of a deleted file and saving that copy in a folder specified by the user. In essence, it creates a duplicate trash folder that can make it easy for a user to recover a file should they accidentally empty out their trash folder.

19
Q

What is a limitation of EaseUS?

A

A limitation of EaseUS is that some features are locked behind a paywall. The free version of EaseUS only lets you know what files it recovered but it does not allow the user to retrieve those files for use.

20
Q

Which file types does Disk Drill struggle to recover?

A

Video and audio files

21
Q

An email can be faked using _____.

A

An email can be faked using SMTP server or Website mailer

22
Q

The key factor that enables fake emails is _____.

A

The key factor that enables fake emails is the ability for impostors to deliver mails by altering the sender’s email information to whatever they want.

23
Q

E-Mail spoofing is defined as _____

A

the process of manipulating the contents of an email in a way that makes the email appear to originate from a source other than the actual sender

24
Q

____ is not a server needed for delivery on the Internet:

A

an email client

25
Q

The main difference between the POP and IMAP e-mail protocols is that _____.

A

The main difference between the POP and IMAP e-mail protocols is that with POP emails are only accessed from the download device while with IMAP emails can be accessed from any device anywhere

26
Q

Which of the following best defines machine vision?

A

Machine vision refers to when computers are used to perform facial recognition scans on people. This technology has recently been employed by China to aid in the capture of wanted suspects.

27
Q

What is one difference between how data was stored in the 90s and early 2000s to how it is stored now?

A

It was common for data in the 90s and early 2000s to be stored on tapes, whereas today you are more likely to store data on different media, such as SSDs and flash drives.

28
Q

Which of the following refers to the study of creating machines that have the ability to think at a level equal to a human being?

A

Artificial Intelligence

29
Q

Forensic investigators benefit from using Li-Fi in their operations because it is more secure than Wi-Fi. In what way is Li-Fi more secure than Wi-Fi?

A

Data traveling through Li-Fi is not broadcast to the surrounding area and is only confined to its transmission route. As such, it is harder for a malicious actor to access this data.

Read Answer Explanation

30
Q

From the given options, which is the cause of the renewed challenges facing security practitioners today?

A

Earth’s population growth and rise in the number of people using digital devices