Advanced Digital Forensics Flashcards

(29 cards)

1
Q

What is the purpose of securing a digital crime scene?

A

To prevent tampering with evidence and preserve its integrity for investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name two things to check when securing a digital device at a crime scene.

A

Device ownership and whether it is connected to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is volatile data, and why is it important?

A

Data that disappears when power is lost; important because it must be collected immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give an example of volatile data.

A

RAM contents, running processes, open network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What tool is used to capture volatile memory?

A

Belkasoft Live RAM Capturer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Dead Acquisition?

A

Collecting data from a powered-off device, preserving the original data structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Order of Volatility?

A

The priority order for collecting data based on how quickly it can be lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary goal of forensic data acquisition?

A

To make an exact bit-by-bit copy of evidence media without altering original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List three types of data acquisition methods.

A

Logical acquisition, Sparse acquisition, Bit-stream imaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Logical Acquisition?

A

Capturing specific files or file types of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Sparse Acquisition?

A

Capturing both selected files and fragments of deleted files from unallocated space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Bit-stream Disk-to-Disk Copy?

A

Cloning one disk directly to another, preserving original data structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name two hashing algorithms used for verifying digital evidence.

A

MD5, SHA-1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Write Blocker, and why is it used?

A

A device preventing any write commands to evidence media during acquisition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of forensic imaging tools like AccessData FTK Imager?

A

To create forensic images of storage media for investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the benefits of forensic readiness for an organization?

A

Faster investigations, lower costs, better defense against cybercrimes.

17
Q

What are examples of Anti-Forensic Techniques?

A

Encryption, steganography, data wiping.

18
Q

What is Steganography?

A

Hiding secret data within ordinary files like images or audio.

19
Q

Name two steganography tools.

A

Steghide, OpenPuff.

20
Q

What is the Sleuth Kit?

A

A set of forensic tools used to examine file systems and disk images.

21
Q

What file systems are analyzed using Autopsy and Sleuth Kit?

A

NTFS, FAT, ExFAT, HFS+, ext3, ext4, UFS.

22
Q

What is the importance of documenting the investigation process?

A

Ensures repeatability, preserves evidence authenticity, and supports court admissibility.

23
Q

What does ‘Bagging and Tagging’ mean in forensics?

A

Labeling and securing physical evidence to maintain the chain of custody.

24
Q

What is a Cluster in file systems?

A

The smallest logical storage unit composed of multiple sectors.

25
What is Slack Space?
Unused space within a disk cluster that may contain remnants of old files.
26
What is a Lost Cluster?
Clusters marked used but not allocated to any file.
27
What is a primary partition?
A disk division that stores the operating system and is necessary for booting.
28
What does the Master Boot Record (MBR) contain?
Partition information and the bootloader needed to start the OS.
29
What is the difference between cold boot and warm boot?
Cold boot starts from powered-off state; warm boot restarts without power off.