Data Acquisition Flashcards
If your time is limited, what type of acquisition data copy method should you consider?
Sparse
What command works similarly to the dd command but has many features designed for computer forensics acquisitions?
dcfldd
What type of acquisition is done if the computer has an encrypted drive and the password or passphrase is available?
Live
What did Microsoft add to its newer operating systems that make performing static acquisitions more difficult?
Whole disk encryption
Which RAID configuration offers the greatest access speed and the most robust data recovery capability?
RAID 15
What option is used with the dcfldd command to designate a hashing algorithm of md5, sha1, sha256, sha384, or sha512?
hash
If the computer has an encrypted drive, a live acquisition is done if the password or passphrase is not available?
False
In addition to RAID 0, what type of RAID configuration is available for Windows XP, 2000, and NT servers and workstations?
RAID 1
What type of acquisition is used for most remote acquisitions?
Live
What term refers to the Linux ISO images that can be burned to a CD or DVD?
Linux Live CDs
By what percentage can lossless compression reduce image file size?
50 percent
A separate manual validation is recommended for all raw acquisitions at the time of analysis.
True
What does Autopsy use to validate an image?
MD5
In Autopsy and many other forensics tools, raw format image files don’t contain metadata.
True
There’s no simple method for getting an image of a RAID server’s disks
True
The most common and time-consuming technique for preserving evidence is creating a duplicate copy of your disk-to-image file.
True
FTK Imager requires that you use a device such as a USB dongle for licensing.
True
Unlike RAID 0, RAID 3 stripes track across all disks that make up one volume.
False
What older Microsoft disk compression tool eliminates only slack disk space between files?
DriveSpace
What command displays pages from the online help manual for information on Linux commands and their options?
man
Similar to Linux, Windows also has built-in hashing algorithm tools for digital forensics.
False
Some acquisition tools don’t copy data in the host protected area (HPA) of a disk drive.
True
Which type of format acquisition leaves the investigator unable to share an image between different vendors’ computer forensics analysis tools?
Proprietary
In addition to md5sum, which hashing algorithm utility is included with current distributions of Linux?
sha1sum