final Flashcards
chapter 6,8,9,10,12,13 review questions (188 cards)
What are the functions required for digital forensics tools?
Acquisition, validation and verification, extraction, reconstruction, and reporting
acquisition
the process of creating a duplicate image of data; one of the required functions of digital tools
brute-force attack
the process of trying every combination of characters to find a matching password or passphrase value for an encrypted file
Computer Forensics Tool Testing (CFTT)
a project sponsored by the National Institute of Standards and Technology (NIST) to manage research on digital forensics tools
extraction
the process of pulling relevant data from an image and recovering or reconstructing data fragments; one of the required functions of digital forensics tools
keyword search
a method of finding files or other information by entering relevant characters, words, or phrases in a search tool
National Software Reference Library (NSRL)
a NIST project with the goal of collecting all known hash values for commercial software and OS files
password dictionary attack
an attack that uses a collection of words or phrases that might be passwords for an encrypted file. password recovery programs can use this to compare potential passwords to an encrypted file’s password or passphrase hash values
validation
a way to confirm that a tool is functioning as intended; one of the functions of digital forensics tools
reconstruction
the process of rebuilding data files; one of the required functions of digital forensics tools
verification
the process of proving that two sets of data are identical by calculating hash values or using another similar method
write-blocker
a hardware device or software program that prevents a computer from writing data to an evidence drive. software write-blockers typically alter interrupt-13 write functions to a drive in a PC’s BIOS. hardware write-blockers are usually bridging devices between a drive and and the forensic workstation
Forensics software tools are grouped into ____ and ___ applications.
command-line and GUI
According to ISO standard 27037, which of the following is an important factor in data acquisition?
Digital Evidence First Responder (DEFR)’s competency and use of validated tools
An encrypted drive is one reason to choose a logical acquisition. True or False?
True
Hashing, filtering, and file header analysis make up which function of digital forensics tools?
Validation and verification
Hardware acquisition tools typically have built-in software for data analysis. True or False?
False
The reconstruction function is needed for which of the following purposes?
recreate a suspect drive to show what happened, create a copy of drive for other investigators, recreate a drive compromised by malwares
List three subfunctions of the extraction function.
data viewing, keyword searching, decompressing/uncompressing, carving, decrypting, book marking/tagging
Hash values are used for which of the following purposes?
filtering known good files from potentially suspicious data,
reconstructing file fragments, validating that the original data hasn’t changed
In testing tools, the term “reproducible results” means that if you work in the same lab on the same machine, you generate the same results. True or false?
False
The verification function does which of the following?
Proves that two sets of data are identical hash values
What’s the advantage of a write-blocking device that connects to a computer through a FireWire or USB controller?
Not having to shut down your workstation when drives are disconnected
Building a forensic workstation is more expensive than purchasing one. True or False?
True