Data Acquisition Flashcards

1
Q

If your time is limited, what type of acquisition data copy method should you consider?

A

Sparse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What command works similarly to the dd command but has many features designed for computer forensics acquisitions?

A

dcfldd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of acquisition is done if the computer has an encrypted drive and the password or passphrase is available?

A

Live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What did Microsoft add to its newer operating systems that make performing static acquisitions more difficult?

A

Whole disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which RAID configuration offers the greatest access speed and the most robust data recovery capability?

A

RAID 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What option is used with the dcfldd command to designate a hashing algorithm of md5, sha1, sha256, sha384, or sha512?

A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If the computer has an encrypted drive, a live acquisition is done if the password or passphrase is not available?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In addition to RAID 0, what type of RAID configuration is available for Windows XP, 2000, and NT servers and workstations?

A

RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of acquisition is used for most remote acquisitions?

A

Live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What term refers to the Linux ISO images that can be burned to a CD or DVD?

A

Linux Live CDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

By what percentage can lossless compression reduce image file size?

A

50 percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A separate manual validation is recommended for all raw acquisitions at the time of analysis.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Autopsy use to validate an image?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Autopsy and many other forensics tools, raw format image files don’t contain metadata.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There’s no simple method for getting an image of a RAID server’s disks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most common and time-consuming technique for preserving evidence is creating a duplicate copy of your disk-to-image file.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FTK Imager requires that you use a device such as a USB dongle for licensing.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Unlike RAID 0, RAID 3 stripes track across all disks that make up one volume.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What older Microsoft disk compression tool eliminates only slack disk space between files?

A

DriveSpace

20
Q

What command displays pages from the online help manual for information on Linux commands and their options?

21
Q

Similar to Linux, Windows also has built-in hashing algorithm tools for digital forensics.

22
Q

Some acquisition tools don’t copy data in the host protected area (HPA) of a disk drive.

23
Q

Which type of format acquisition leaves the investigator unable to share an image between different vendors’ computer forensics analysis tools?

A

Proprietary

24
Q

In addition to md5sum, which hashing algorithm utility is included with current distributions of Linux?

25
Acquisitions of RAID drives can be challenging and frustrating for digital forensics examiners because of how RAID systems are designed, configured, and sized.
True
26
What's the most critical aspect of digital evidence?
Validation
27
Name the three formats for digital forensics data acquisitions
Raw, Proprietary formats, and AFF
28
Name the three formats for digital forensics data acquisitions
Raw, Proprietary formats, and AFF
29
With remote acquisitions, what problems should you be aware of?
Antivirus, antispyware, and firewall programs
30
Why is it a good practice to make two images of a suspect drive in a critical investigation?
To ensure at least one good copy of the forensically collected data in case of any failures
31
What's the maximum file size when writing data to a FAT32 drive?
2 GB
32
In Linux, the fdisk -l command lists the suspect drive as /dev/hda1. So, is the following dcfldd command correct? ddfldd if+image_file.img of=/dev/hda1
False
33
Of all the proprietary formats, which one is the unofficial standard?
Expert Witness
34
What are two concerns when acquiring data from a RAID server?
Amount of data storage needed and type of RAID
35
With newer Linux kernel distributions, USB devices are automatically mounted, which can alter data on it.
True
36
Which forensics tools can connect to a suspect's remote computer and run surreptitiously?
EnCase Enterprise and ProDiscover Incident Response
37
A hashing algorithm is a program designed to create a binary or hexadecimal number that represents the uniqueness of a data set, file, or entire disk
True
38
A logical acquisition collects only specific files of interest to the case
True
39
What does a sparse acquisition collect for an investigation?
Fragments of unallocated data in addition to the logical allocated data
40
Name two commercial tools that can make a forensic sector-by-sector copy of a drive to a larger drive
EnCase and X-ways Forensics
41
FTK Imager can acquire data in a drive's host protected area
False
42
Commonly, proprietary format acquisition files can compress the acquisition data and segment acquisition output files into smaller volumes
True
43
The main goal of a static acquisition is the preservation of digital evidence.
True
44
Slower data transfer speeds and dealing with minor data errors are two disadvantages of the raw format
False
45
In the Linux dcfldd command, which three options are used for validating data?
hash, hashlog, and vf