Cengage Chapter 3 - Data Acquisition Flashcards

1
Q

An open-source data acquisition format that stores image data and metadata. File extensions include .afd for segmented image files and .afm for ____ metadata.

A

Advanced Forensic Format (AFF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An area of a disk drive reserved for booting utilities and diagnostic programs. It’s not visible to the computer’s OS.

A

host protected area (HPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A data acquisition method used when a suspect computer can’t be shut down to perform a static acquisition. Captured data might be altered during the acquisition because it’s not write-protected. _______________________ aren’t repeatable because the suspect computer’s OS is continuously altering data.

A

live acquisitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This data acquisition method captures only specific files of interest to the case or specific types of files, such as Outlook .pst files.

A

logical acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A data acquisition format that creates simple sequential flat files of a suspect drive or data set.

A

raw format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two or more disks combined into one large drive in several configurations for special needs. Some RAID systems are designed for redundancy to ensure continuous operation if one disk fails. Another configuration spreads data across several disks to improve access speeds for reads and writes.

A

redundant array of independent disks (RAID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Like logical acquisitions, this data acquisition method captures only specific files of interest to the case, but it also collects fragments of unallocated (deleted) data. See also logical acquisition.

A

sparse acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A data acquisition method used when a suspect drive is write-protected and can’t be altered. If disk evidence is preserved correctly, ____________________ are repeatable.

A

static acquisitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An encryption technique that performs a sector-by-sector encryption of an entire drive. Each sector is encrypted in its entirety, making it unreadable when copied with a static acquisition method.

A

whole disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly