Chapters 13&14 Flashcards

(42 cards)

1
Q

What is the definition of computer forensics?

A

The analysis of electronic and residual data for recovery, legal preservation, authentication, reconstruction, and presentation to solve or aid in solving technology-based crimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of crimes investigated in computer forensics?

A

Securities fraud, bank fraud, health care fraud, child pornography, public corruption, insurance fraud, money laundering, high yield investment fraud, terroristic acts, and computer intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is digital forensics?

A

The investigation of all electronic devices (like cell phones, smart watches, GPS, and computers) to meet the collection and preservation goals of computer forensics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What technical skills are necessary for digital evidence collection?

A

Understanding various operating systems; quickly identifying pertinent digital data; properly preserving, securing, and collecting data; maintaining a proper chain of custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some risks (“landmines”) in handling digital evidence?

A

Missing evidence, changing evidence during collection, destroying evidence, losing evidence, mishandling evidence, failing to protect evidence, or not properly collecting it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the steps involved in the digital evidence process?

A

Legal access → Identify evidence → Record condition → Collect → Transport → Secure → Review → Identify to support fraud → Flag for future use → Demonstrate in trial → Disposition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why should you not power on an electronic device when collecting evidence?

A

It could compromise evidence integrity and result in suppression in court; powering off may also erase volatile data like cached memory or network state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name examples of imaging software tools used in digital forensics.

A

EnCase, Helix, SafeBack, Cellebrite (for cell phones).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of imaging software tools?

A

To collect digital data without affecting data integrity, creating a read-only bitstream duplicate of the original drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of data extraction or data mining software?

A

IDEA (Interactive Data Extraction & Analysis), ACL, ActiveData.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of digital evidence locations?

A

Text files, metadata, swap file space, cache, deleted files, email, slack space, LAN logs, WiFi connections, external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are protocols in internet communication?

A

Rules that allow different operating systems and machines to communicate over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are TCP and IP protocols used for?

A

For communication over the internet; nearly every information packet uses TCP/IP for transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an IP address?

A

A 32-bit number identifying the sender and recipient in internet communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why was IPv4 replaced by IPv6?

A

IPv4 ran out of addresses; IPv6 uses 128 bits, providing ~340 undecillion unique addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a MAC address?

A

A six two-digit hexadecimal number unique to each network interface, used for device identification in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of examining web logs in an investigation?

A

To trace website usage and identify the attacker’s online activity.

18
Q

What protocol is used to send email over the internet?

A

Simple Mail Transfer Protocol (SMTP).

19
Q

Why are expanded email headers important?

A

They contain critical tracing data like IP addresses and message IDs for investigations.

20
Q

What is an IMEI number?

A

A 15-digit number unique to each mobile device, used to track phones.

21
Q

What is an ICCID number?

A

A 19- or 20-digit number unique to each SIM card, identifying the SIM globally.

22
Q

What is a proxy server used for by cybercriminals?

A

To hide their IP address and conceal their online identity.

23
Q

What is the Tor browser used for?

A

To anonymize internet use by routing communications through random networks of relays.

24
Q

Time stamps cannot be altered

25
When forensic investigations go beyond computers, it is called
Digital forensics
26
PCAOB AS No. 2 (Now AS 5) outlines in detail the step necessary to achieve proper IS controls needed to prevent financial fraud
False
27
Mirror imaging software makes a bitstream, read only image of a computer disk
True
28
If a computer is simply powered off using the normal shutdown procedures, cached memory contents, volatile in-transit data, and state of network connection information disappear
True
29
What is residual data
Slack space
30
All of the following will destroy electronic evidence for courtroom purposes
Copying the document Improperly controlling its use Normal shutdown of a computer containing electronic evidence
31
Comparing the hash code on two files shows
If two files are identical
32
The chain of custody is a term that means
A record of who has handled electronic evidence is maintained
33
Seizure of a computer considered to be part of a cybercrime is done with what legal document?
Warrant
34
Seizure of electronic property as a part of a cybercrime investigation may be restricted by which amendment
4th amendment
35
Metadata is
Information about an electronic file that is not immediately apparent to the user
36
E-mail logs are best found in
SMTP servers
37
The time information found in an email header is based on
Greenwich mean time
38
A way to hide my email address is to
Use a proxy server for sending emails Use a remailer
39
How is slack space created
There is leftover data in a cluster that has been reused for storing new data by the operating system
40
What technology does law enforcement use to make an exact image of someones cellphone
Cellebrite
41
IP's refer to those rules allowing different operating systems and machines to communicate with one another over the internet
True
42
Obtaining web logs can be helpful in securing digital evidence. Which should be considered in obtaining web logs?
Web logs are maintained for a short period of time Issuing a preservation letter ensures the web logs are secured for a stated period of time Legal process is still needed after a preservation letter is issued to obtain the records