Final Exam Flashcards

1
Q

By the 1970s electronic crimes were increasing especially in the financial sector.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To be a successful computer forensics investigator you must be familiar with more than one computing platform.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer investigations and forensics fall into the same category: public investigations.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The law of search and seizure protects the rights of all people excluding people suspected of crimes.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

After a judge approves and signs a search warrant, it’s ready to be executed, meaning you can collect evidence as defined by the warrant.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maintaining credibility means you must form and sustain unbiased opinions of your cases.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The definition of digital forensics has evolved over the years from simply involving securing and analyzing digital information stored on a computer for use as evidence in civil, criminal, or administrative cases.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Fourth Amendment to the U.S. Constitution (and each state’s constitution) protects everyone’s rights to be secure in their person, residence, and property from search and seizure.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you work in the enterprise digital group you test and verify the integrity of standalone workstations and network servers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The police blotter provides a record of clues to crimes that have been committed previously.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which entity was formed by the FBI in 1984 to handle the increasing number of cases involving digital evidence?

A

Computer Analysis and Response Team (CART)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence of a crime. Which type of task is the technician performing?

A

Data recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which group often works as part of a team to secure an organization’s computers and networks?

A

Forensic investigators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime?

A

Digital investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which agency introduced training on software for forensics investigations by the early 1990s?

A

IACIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Pacific Northwest agency meets to discuss problems that digital forensics examiners encounter?

A

CTIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which type of case involves charges such as burglary, murder, or molestation?

A

Criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the third stage of a criminal case after the complaint and the investigation?

A

Prosecution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does the investigator in a criminal or public-sector case submit at the request of the prosecuting attorney if he or she has enough information to support a search warrant?

A

Affidavit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When an investigator seeks a search warrant which of the following must be included in an affidavit to support the allegation of a crime?

A

Probable cause?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What must be done under oath to verify that the information in the affidavit is true?

A

It must be notarized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do published company policies provide for a business that enables them to conduct internal investigations?

A

Line of authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What usually appears when a computer starts or connects to the company intranet network or virtual private network (VPN) and informs end users that the organization reserves the right to inspect computer systems and network traffic at will?

A

Warning banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What term refers to a person using a computer to perform routine tasks other than systems administration?

A

End user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which term refers to an accusation or supposition of fact that a crime has been committed and is made by the complainant based on the incident?

A

Allegation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Without a warning banner what right might employees assume they have when using a company’s computer systems and network accesses?

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What term refers to the individual who has the power to conduct digital forensic investigations?

A

Authorized requester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is most often the focus of digital investigations in the private sector?

A

Misuse of digital assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which doctrine found to be unconstitutional was used to allow a civilian or private-sector investigative agent to deliver evidence obtained in a manner that violated the Fourth Amendment to a law enforcement agency?

A

Silver platter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A forensics analysis of a 6 TB disk for example can take several days or weeks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Requirements for taking the EnCE certification exam depend on taking the Guidance Software EnCase training courses.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

If damage occurs to the floor walls ceilings or furniture in your computer forensics lab it does not need to be repaired immediately.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A good working practice is to use less powerful workstations for mundane tasks and multipurpose workstations for the higher-end analysis tasks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Computing systems in a forensics lab should be able to process typical cases in a timely manner.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

By using marketing to attract new customers or clients you can justify future budgets for the lab’s operation and staff.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The ANSI-ASQ National Accreditation Board (ANAB) is a wholly owned subsidiary of the American Society of Crime Laboratory Directors (ASCLD).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The lab manager sets up processes for managing cases and reviews them regularly.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

For daily work production several examiners can work together in a large open area as long as they all have different levels of authority and access needs.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Chapter 5 Section 3 of the NISPOM describes the characteristics of a safe storage container.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

At what location does the forensics investigator conduct investigations, store evidence, and do most of his or her work?

A

Digital forensics lab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

At what levels should lab costs be broken down?

A

Monthly, quarterly, and annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What reports are generated at the local state and federal levels to show the types and frequency of crimes committed?

A

Uniform crime reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

In addition to FAT16, FAT32, and Resilient File System which file system can Windows hard disks also use?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What organization was created by police officers in order to formalize credentials for digital investigators?

A

IACIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How frequently does IACIS require recertification to demonstrate continuing work in the field of computer forensics?

A

Every three years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What HTCN certification level requires candidates have three years of experience in computing investigations for law enforcement or corporate cases?

A

Certified Computer Forensic Technician, Basic (CCFT-B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What kind of forensic investigation lab best preserves the integrity of evidence?

A

A secure facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

At what distance can the EMR from a computer monitor be picked up?

A

1/2 mile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

During the Cold War defense contractors were required to shield sensitive computing systems and prevent electronic eavesdropping of any computer emissions. What did the U.S. Department of Defense call this special computer-emission shielding?

A

TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What material is recommended for secure storage containers and cabinets?

A

Steel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How frequently should floors and carpets in the computer forensic lab be cleaned to help minimize dust that can cause static electricity?

A

Once a week

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which resource can be helpful when investigating older and unusual computing systems?

A

AICIS lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What type of plan specifies how to rebuild a forensic workstation after it has been severely contaminated by a virus from a drive you’re analyzing?

A

Disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Where should your computer backups be kept?

A

Off-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What process refers to recording all the updates made to a workstation?

A

Configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Methods for restoring large data sets are important for labs using which type of servers?

A

RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which activity involves determining how much risk is acceptable for any process or operation?

A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the maximum amount of time computing components are designed to last in normal business operations?

A

36 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

In what process is the acquisition of newer and better resources for investigation justified?

A

Building a business case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

If the computer has an encrypted drive a live acquisition is done if the password or passphrase is not available.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

The most common and time-consuming technique for preserving evidence is creating a duplicate copy of your disk-to-image file.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Some acquisition tools don’t copy data in the host protected area (HPA) of a disk drive.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

FTK Imager requires that you use a device such as a USB dongle for licensing.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Unlike RAID 0, RAID 3 stripes tracks across all disks that make up one volume.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

In Autopsy and many other forensics tools, raw format image files don’t contain metadata.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Similar to Linux, Windows also has built-in hashing algorithm tools for digital forensics.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A separate manual validation is recommended for all raw acquisitions at the time of analysis.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Acquisitions of RAID drives can be challenging and frustrating for digital forensics examiners because of how RAID systems are designed, configured, and sized.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

There’s no simple method for getting an image of a RAID server’s disks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which type of format acquisition leaves the investigator unable to share an image between different vendors’ computer forensics analysis tools?

A

Proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What type of acquisition is typically done on a computer seized during a police raid?

A

Static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What type of acquisition is done if the computer has an encrypted drive and the password or passphrase is available?

A

Live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is the most common and flexible data-acquisition method?

A

Disk-to-image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

If your time is limited, what type of acquisition data copy method should you consider?

A

Logical or sparse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

By what percentage can lossless compression reduce image file size?

A

50%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What did Microsoft add to its newer operating systems that makes performing static acquisitions more difficult?

A

Whole disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What term refers to Linux ISO images that can be burned to a CD or DVD?

A

Linux live CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What command displays pages from the online help manual for information on Linux commands and their options?

A

man

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What command creates a raw format file that most computer forensics analysis tools can read?

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What command works similarly to the dd command but has many features designed for computer forensics acquisitions?

A

dcfldd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

In addition to md5sum which hashing algorithm utility is included with current distributions of Linux?

A

sha1sum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What option is used with the dcfldd command to designate a hashing algorithm of md5, sha1, sha256, sha384, or sha512?

A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What does Autopsy use to validate an image?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What older Microsoft disk compression tool eliminates only slack disk space between files?

A

DriveSpace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

In addition to RAID 0, what type of RAID configuration is available for Windows XP 2000 and NT servers and workstations?

A

RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

In which RAID configuration do two or more disk drives become one large volume so the computer views the disks as a single disk?

A

RAID 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which RAID configuration also called mirrored striping is a combination of RAID 1 and RAID 0?

A

RAID 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which RAID configuration offers the greatest access speed and most robust data recovery capability?

A

RAID 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What type of acquisition is used for most remote acquisitions?

A

Live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

ISPs can investigate computer abuse committed by their customers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

If you follow police instructions to gather additional evidence without a search warrant after you have reported the crime you run the risk of becoming an agent of law enforcement.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

A judge can exclude evidence obtained from a poorly worded warrant.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

The reason for the standard practice of securing an incident or crime scene is to expand the area of control beyond the scene’s immediate location.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Corporate investigators always have the authority to seize all computer equipment during a corporate investigation.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

The most common computer-related crime is check fraud.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Private-sector organizations include small to medium businesses, large corporations, and non-government organizations (NGOs) which always get funding from the government or other agencies.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Some cases involve dangerous settings. For these types of investigations you must rely on the skills of hazardous materials (HAZMAT) teams to recover evidence from the scene.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner employees have an expectation of privacy.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

When an investigator finds a mix of information, judges often issue a limiting phrase to the warrant which allows the police to present all evidence together.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

When federal courts are evaluating digital evidence from computer-generated records what exception is applied to hearsay?

A

Business-records exception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Under what circumstances are digital records considered admissible?

A

If they qualify as business records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What type of records are considered data that the system maintains such as system log files and proxy server logs?

A

Computer-generated records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

When was the Freedom of Information Act originally enacted?

A

1967

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which is the most accurate statement about investigating and controlling computer incident scenes in private-sector environments as compared to crime scenes?

A

Investigating and controlling the scene is much easier in private sector environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

At a minimum what do most company policies require that employers have in order to initiate an investigation?

A

Reasonable suspicion that a law or policy is being violated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

When confidential business data are included with the criminal evidence what are they referred to as?

A

Commingled data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What standard is used to determine whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest?

A

Probable cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What do law enforcement investigators need in order to remove computers from a crime scene and transport them to a lab?

A

A warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

In addition to environmental issues, what issues are the investigator’s primary concerns when working at the scene to gather information about an incident or a crime?

A

Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

When recovering evidence from a contaminated crime scene, the investigator should take measures to avoid damage to the drive from overheating. At what temperature should the investigator take action?

A

80 C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What will allow the investigator to arrive at a scene, acquire the needed data, and return to the lab as quickly as possible?

A

Initial-response field kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which type of kit should include all the tools the investigator can afford to take to the field?

A

Extensive-response field kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What type of evidence do courts consider evidence data in a computer to be?

A

Digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

The presence of police officers and other professionals who aren’t part of the crime scene-processing team may result in the loss or corruption of data through which process?

A

Professional curiosity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

When seizing computer evidence in criminal investigations which organization’s standards should be followed?

A

Department of Justice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Power should not be cut during an investigation involving a live computer unless it is what type of system?

A

Older Windows or MS-DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What type of files might lose essential network activity records if power is terminated without a proper shutdown?

A

Event log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Which technique can be used for extracting evidence from large systems?

A

Sparse acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

What is required for real-time surveillance of a suspect’s computer activity?

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

The type of file system an OS uses determines how data is stored on the disk.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

One way to examine a partition’s physical level is to use a disk editor such as WinHex or Hex Workshop.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

As data is added the MFT can expand to take up 75% of the NTFS disk.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

The first 5 bytes (characters) for all MFT records are FILE.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Alternate data streams can obscure valuable evidentiary data intentionally or by coincidence.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Typically a virtual machine consists of just one file.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

From a network forensics standpoint there are no potential issues related to using virtual machines.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

In Microsoft file structures, sectors are grouped to form clusters which are storage allocation units of one or more sectors.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Drive slack includes RAM slack (found mainly in older Microsoft OSs) and file slack.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

It’s possible to create a partition, add data to it, and then remove references to the partition so that it can be hidden in Windows.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

What term refers to a column of tracks on two or more disk platters?

A

Cylinder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

How do most manufacturers deal with a platter’s inner tracks having a smaller circumference than its outer tracks?

A

Zone bit recording (ZBR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What term refers to the number of bits in one square inch of a disk platter?

A

Areal density

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Which acronym refers to the file structure database that Microsoft originally designed for floppy disks?

A

FAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Which acronym refers to the file system that was introduced when Microsoft created Windows NT and that remains the main file system in Windows 10?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

What is on an NTFS disk immediately after the Partition Boot Sector?

A

Master File Table (MFT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What are records in the MFT called?

A

FILE records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

In the NTFS MFT all files and folders are stored in separate records of how many bytes each?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

The file or folder’s MFT record provides cluster addresses where the file is stored on the drive’s partition. What are these cluster addresses called?

A

Data runs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

What is the name of the optional built-in encryption that Microsoft added to NTFS when Windows 2000 was introduced?

A

Encrypting File System (EFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Which certificate provides a mechanism for recovering files encrypted with EFS if there is a problem with the user’s original private key?

A

Recovery certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

When Microsoft created Windows 95, into what were initialization (.ini) files consolidated?

A

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What specifies the Windows XP path installation and contains options for selecting the Windows version?

A

Boot.ini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Which filename refers to a 16-bit real-mode program that queries the system for device and configuration data and then passes its findings to Ntldr?

A

NTDetect.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Which filename refers to the device driver that allows the OS to communicate with SCSI or ATA drives that aren’t related to the BIOS?

A

NTBootdd.sys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

What contains instructions for the OS for hardware devices such as the keyboard mouse and video card?

A

Device Drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Which filename refers to a core Win32 subsystem DLL file?

A

Kernel32.dll, Advapi32.dll, User32.dll, Gdi32.dll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Which filename refers to the physical address support program for accessing more than 4 GB of physical RAM?

A

Ntkrnlpa.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Which filename refers to the Windows XP system service dispatch stubs to executables functions and internal support functions?

A

Ntdll.dll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What enables the user to run another OS on an existing physical computer (known as the host computer) by emulating a computer’s hardware environment?

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

When you research for computer forensics tools, strive for versatile, flexible, and robust tools that provide technical support.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

In software acquisition there are three types of data-copying methods.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

To help determine which computer forensics tool to purchase, a comparison table of functions subfunctions and vendor products is useful.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Computers used several OSs before Windows and MS-DOS dominated the market.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

After retrieving and examining evidence data with one tool you should verify your results by performing the same tasks with other similar forensics tools.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Software forensic tools are grouped into command-line applications and GUI applications.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

The validation function is the most challenging of all tasks for computer investigators to master.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Although a disk editor gives you the most flexibility in testing, it might not be capable of examining a compressed file’s contents.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Because there are a number of different versions of UNIX and Linux these OSs are referred to as CLI platforms.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Hardware manufacturers have designed most computer components to last about 36 months between failures.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Which digital forensics tool is categorized as a single-purpose hardware component?

A

Tableau T35es-R2 SATA/IDE eSATA bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Where do software forensics tools copy data from a suspect’s disk drive?

A

Image file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Which tool enables the investigator to acquire the forensic image and process it in the same step?

A

Magnet AXIOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

What Linux command is used to create the raw data format?

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Which activity involves sorting and searching through investigation findings to separate good data and suspicious data?

A

Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Many password recovery tools have a feature for generating potential password lists for which type of attack?

A

Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Which type of copy from the suspect disk to the target location does the simplest method of duplicating a disk drive make?

A

Physical bit-by-bit copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

What must be created to complete a forensic disk analysis and examination?

A

Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

The first MS-DOS tools that analyzed and extracted data from floppy disks and hard disks were used with which type of PC file systems?

A

IBM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

In Windows 2000 and later which command shows you the file owner if you have multiple users on the system or network?

A

Dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Building your own forensics workstation:

A

requires the time and skills necessary to support the chosen hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What do you call a forensics workstation consisting of a laptop computer with almost as many bays and peripherals as a stationary workstation?

A

portable workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

What type of disk is commonly used with Sun Solaris systems?

A

SPARC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

What is the general term for software or hardware that is used to protect evidence disks by preventing data from being written to them?

A

Write protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Devices used to prevent data from being written to a disk can connect to a computer through FireWire, SATA, PATA, and SCSI controllers as well as which other type of controller?

A

USB 2.0 and 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Which entity publishes articles, provides tools, and creates procedures for testing and validating computer forensics software?

A

NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Which standards document demands accuracy for all aspects of the testing process?

A

ISO 5725

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Which NIST project manages research on forensics tools?

A

Computer Forensic Tool Testing (CFTT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files?

A

SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Which type of tool can be used to compare results and verify a new tool by viewing data in its raw format?

A

Disk editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

If a file contains information it always occupies at least one allocation block.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

macOS is built with the new Apple File System (APFS). The current version offers better security encryption and performance speeds, but users can’t mount HFS+ drives.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Some notable UNIX distributions included Silicon Graphics Inc. (SGI), IRIX, Santa Cruz Operation (SCO) UnixWare, Sun Solaris, IBM AIX, and HP-UX.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Does Windows have a kernel?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

The pipe (|) character redirects the output of the command preceding it.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

All disks have more storage capacity than the manufacturer states.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Before OS X, the Hierarchical File System (HFS) was used in which files are stored in directories (folders) that can be nested in other directories.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

The HFS and HFS+ file systems have four descriptors for the end of a file (EOF).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Ext3 is a journaling version of Ext2 that has a built-in file recovery mechanism used after a crash.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

In macOS, volume fragmentation is kept to a minimum by removing clumps from larger files.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Macintosh moved to the Intel processor and became UNIX based with which operating system?

A

OS X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

In older versions of macOS, in which fork are file metadata and application information stored?

A

Resource fork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

In macOS, in addition to allocation blocks, what kind of blocks do volumes have?

A

Logical blocks

193
Q

In older versions of macOS where is all information about the volume stored?

A

Master Directory Block (MDB)

194
Q

What macOS system application tracks each block on a volume to determine which blocks are in use and which ones are available to receive data?

A

Volume Bitmap

195
Q

In macOS what stores any file information not in the Master Directory Block or Volume Control Block?

A

Extents overflow file

196
Q

Which term is often used when discussing Linux because technically Linux is only the core of the OS?

A

Kernel

197
Q

What was the early standard Linux file system?

A

Ext2

198
Q

What is the largest disk partition Ext4 can support?

A

1 exabyte

199
Q

What contains file and directory metadata and provides a mechanism for linking data stored in data blocks?

A

Inodes

200
Q

At what hard link count is a file effectively deleted?

A

Zero

201
Q

How many components define the file system on UNIX/Linux?

A

Four

202
Q

Where are directories and files stored on a disk drive?

A

Data block

203
Q

In Linux in which directory are most system configuration files stored?

A

/etc/

204
Q

In Linux in which directory are most applications and commands stored?

A

/usr/

205
Q

On a Linux computer by what are file systems exported to remote hosts represented?

A

/etc/exports

206
Q

On a Linux computer what contains group memberships for the local system?

A

/etc/group

207
Q

In a file’s inode what are the first 10 pointers called?

A

Indirect pointers

208
Q

In macOS which fork typically contains data the user creates?

A

Data fork

209
Q

In macOS, when working with an application file, which fork contains additional information such as menus, dialog boxes, icons, executable code, and controls?

A

Resource fork

210
Q

Bitmap images are collections of dots or pixels in a grid format that form a graphic.

A

True

211
Q

Operating systems do not have tools for recovering image files.

A

False

212
Q

If a graphics file is fragmented across areas on a disk you must recover all the fragments before re-creating the file.

A

True

213
Q

With many computer forensics tools, you can open files with external viewers.

A

True

214
Q

Steganography cannot be used with file formats other than image files.

A

False

215
Q

Under copyright laws, maps and architectural plans may be registered as pictorial, graphic, and sculptural works.

A

True

216
Q

A graphics program creates and saves one of three types of image files: bitmap, vector, or XIF.

A

False

217
Q

The Internet is the best source for learning more about file formats and their extensions.

A

True

218
Q

All TIF files start at position zero (offset 0 is the first byte of a file) with hexadecimal 49 49 3B.

A

False

219
Q

The two major forms of steganography are insertion and substitution.

A

True

220
Q

What kinds of images are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes?

A

Vector

221
Q

What tools are used to create, modify, and save bitmap, vector, and metafile graphics?

A

Graphics editors

222
Q

Which images store graphics information as grids of pixels?

A

Bitmap

223
Q

What is the process of converting raw picture data to another format called?

A

Demosaicing

224
Q

In which format are most digital photographs stored?

A

Exchangeable Image File (Exif)

225
Q

Which type of compression compresses data permanently by discarding bits of information in the file?

A

Lossy compression

226
Q

What term refers to recovering fragments of a file?

A

Carving

227
Q

Which JFIF format has a hexadecimal value of FFD8 FFE0 in the first four bytes?

A

JFIF

228
Q

If a graphics file cannot be opened in an image viewer what should the next step be?

A

Examining the header data

229
Q

Which uppercase letter has a hexadecimal value 41?

A

A

230
Q

From which file format is the image format XIF derived?

A

TIFF

231
Q

What is the simplest way to access a file header?

A

Using a hexadecimal editor like WinHex

232
Q

Which header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C 01 00 00 20 65 58 74 65 6E 64 65 64 20 03?

A

XIF

233
Q

Which term refers to a data-hiding technique that uses host files to cover the contents of a secret message?

A

Steganography

234
Q

Which data-hiding technique places data from the secret file into the host file without displaying the secret data when the host file is viewed in its associated program?

A

Insertion steganography

235
Q

Which data-hiding technique replaces bits of the host file with other bits of data?

A

Substitution steganography

236
Q

What is another term for steganalysis tools?

A

Steg tools

237
Q

What technique has been used to protect copyrighted material by inserting digital watermarks into a file?

A

Steganography

238
Q

What type of laws should computer investigators be especially aware of when working with image files in order to avoid infringement violations?

A

Copyright laws

239
Q

How may computer programs be registered under copyright laws?

A

As written works

240
Q

The defense request for full discovery of digital evidence applies only to criminal cases in the United States.

A

True

241
Q

For target drives use only recently wiped media that have been reformatted and inspected for computer viruses.

A

True

242
Q

Autopsy for Windows cannot perform forensics analysis on FAT file systems.

A

False

243
Q

Autopsy for Windows cannot analyze data from image files from other vendors.

A

False

244
Q

When two files look the same when viewed but one has an invisible digital watermark they appear to be the same file except for their sizes.

A

False

245
Q

Several password-cracking tools are available for handling password-protected data or systems.

A

True

246
Q

Most organizations keep e-mail for longer than 90 days.

A

False

247
Q

Some encryption schemes are so complex that the time to crack them can be measured in days, weeks, years, and even decades.

A

True

248
Q

Private-sector cases such as employee abuse investigations might not specify limitations in recovering data.

A

True

249
Q

For static acquisitions, remove the original drive from the computer if practical and then check the date and time values in the system’s CMOS.

A

True

250
Q

What does scope creep typically do?

A

Increases the amount of work required

251
Q

What should be created in order to begin a digital forensics case?

A

Investigation plan

252
Q

In addition to search warrants what defines the scope of civil and criminal cases?

A

Subpoenas

253
Q

Which program has an indexed version of the NIST NSRL of MD5 hashes that can be imported to enhance searching for and eliminating known OS and application files?

A

Autopsy

254
Q

Because digital forensics tools have limitations in performing hashing what tools should be used to ensure data integrity?

A

Advanced hexadecimal editors

255
Q

Which AccessData feature compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data?

A

FTK KFF

256
Q

Which activity involves changing or manipulating a file to conceal information?

A

Data hiding

257
Q

Which Windows disk partition utility can be used to hide partitions?

A

diskpart

258
Q

The data-hiding technique involving marking bad clusters is more commonly used with what type of file system?

A

FAT

259
Q

Which term comes from the Greek word for ‘hidden writing’?

A

Steganography

260
Q

When both the original file with no hidden message and the converted file with the hidden message are available what analysis method is recommended by Johnson and Jajodia?

A

Known cover attack

261
Q

What technology is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure?

A

Key escrow

262
Q

Which program incorporates an advanced encryption technique that can be used to hide data?

A

PGP or BestCrypt

263
Q

Which type of recovery is becoming more common in digital forensic analysis?

A

Password recovery

264
Q

What type of attacks use every possible letter number and character found on a keyboard when cracking a password?

A

Brute-force

265
Q

Many password-protected OSs and applications store passwords in the form of which type of hash values?

A

MD5 or SHA

266
Q

Which action alters hash values making cracking passwords more difficult?

A

Salting

267
Q

What limits the data that can be sought in a criminal investigation?

A

Search warrant

268
Q

Which data-hiding technique changes data from readable code to data that looks like binary executable code?

A

Bit-shifting

269
Q

Which hashing algorithm is provided by WinHex?

A

MD5

270
Q

When intruders break into a network they rarely leave a trail behind.

A

False

271
Q

Network forensics is a fast easy process.

A

False

272
Q

Virtual machines are now common for both personal and business use.

A

True

273
Q

Virtual machines (VMs) help offset hardware costs for companies.

A

True

274
Q

Type 2 hypervisors cannot be used on laptops.

A

False

275
Q

Type 1 hypervisors are usually the ones you find loaded on a suspect machine.

A

False

276
Q

Before attempting to install a type 2 hypervisor you need to enable virtualization in the BIOS before attempting to create a VM.

A

True

277
Q

In network forensics you have to restore the drive to see how malware that attackers have installed on the system works.

A

True

278
Q

A honeywall is a computer set up to look like any other machine on your network but it lures the attacker to it.

A

False

279
Q

Network logs record traffic in and out of a network.

A

True

280
Q

Which type of forensics can help you determine whether a system is truly under attack or a user has inadvertently installed an untested patch or custom program?

A

Network forensics

281
Q

Which type of strategy hides the most valuable data at the innermost part of the network?

A

Layered network defense strategy

282
Q

What type of software runs virtual machines?

A

Hypervisor

283
Q

Which type of virtual machine software is typically but not exclusively loaded on servers or workstations with a lot of RAM and storage?

A

Tier 1 hypervisor

284
Q

Which product responded to the need for security and performance by producing different CPU designs?

A

Intel Virtualization Technology

285
Q

Which program can be used to examine network traffic?

A

Wireshark, tcpdump

286
Q

Which tool lists all open network sockets including those hidden by rootkits?

A

Mandiant Memoryze

287
Q

What determines how long a piece of information lasts on a system?

A

Order of Volatility (OoV)

288
Q

Which network defense strategy developed by the National Security Agency (NSA) has three modes of protection?

A

Defense in Depth (DiD)

289
Q

Which tool allows network traffic to be viewed graphically?

A

Etherape

290
Q

Which network protocol analyzer can be programmed to examine TCP headers to find the SYN flag?

A

tcpdump, tethereal

291
Q

Which tool is useful for extracting information from large Libpcap files?

A

Tcpslice

292
Q

What are packet analyzers?

A

Devices or software placed on a network to monitor traffic.

293
Q

On which OSI model layers do most packet analyzers operate?

A

Two or three

294
Q

Which format can be read by most packet analyzer tools?

A

Pcap

295
Q

In which type of attack does the attacker keep asking the server to establish a connection?

A

SYN flood

296
Q

Which tool was designed as an easy-to-use interface for inspecting and analyzing large tcpdump files?

A

Netdude

297
Q

Which tool probes, collects, and analyzes session data?

A

Argus

298
Q

Which project was developed to make information widely available in an attempt to thwart Internet and network hackers?

A

Honeynet

299
Q

What term is used for the machines used in a DDoS attack?

A

Zombies

300
Q

For digital investigators, tracking intranet e-mail is easier because accounts use standard names the administrator establishes.

A

True

301
Q

Investigating crimes or policy violations involving e-mail is different than investigating other types of computer abuse and crimes.

A

False

302
Q

E-mail programs either save e-mail messages on the client computer or leave them on the server.

A

True

303
Q

All e-mail servers use databases that store multiple users’ e-mails.

A

False

304
Q

Like UNIX e-mail servers, Exchange maintains logs to track e-mail communication.

A

True

305
Q

Forensic linguistics encompasses civil cases, criminal cases, cyberterrorism cases, and other legal proceedings.

A

True

306
Q

E-mail crimes and violations rarely depend on the city state and country in which the e-mail originated.

A

False

307
Q

Evidence artifacts vary depending on the social media channel and the device.

A

True

308
Q

A challenge with using social media data in court is authenticating the author and the information.

A

True

309
Q

You can send and receive e-mail in two environments: via the Internet or an intranet (an internal network).

A

True

310
Q

What name is used for the configuration typically used for e-mail messages that are distributed from a central server to many connected client computers?

A

Client-server

311
Q

In an e-mail address what symbol separates the domain name from the rest of the address?

A

@

312
Q

In what type of e-mail programs can the user copy an e-mail message by dragging the message to a storage medium such as a folder or drive?

A

GUI

313
Q

What is the main information being sought when examining e-mail headers?

A

The originating e-mail’s IP address

314
Q

To retrieve e-mail headers in Microsoft Outlook what option should be clicked after the e-mail has been selected?

A

File, Properties

315
Q

In Web-based e-mail how are messages displayed and saved?

A

Web pages in the browser’s cache

316
Q

In which discipline do professionals listen to voice recordings to determine who’s speaking or read e-mail and other writings known to be by a certain person and determine whether that person wrote the e-mail or letter in question?

A

Forensic linguistics

317
Q

To view Gmail Web e-mail headers, what should be clicked after the e-mail has been opened and the down arrow next to the Reply circular arrow has been clicked?

A

Show Original

318
Q

To view e-mail headers on Yahoo!, what should be clicked on after ‘More’ has been selected?

A

View Raw Message

319
Q

In Microsoft Outlook what file extension is used with saved, sent, drafted, deleted, and received e-mails?

A

.pst or .ost

320
Q

Which site can be used to verify the names of domains a message is flowing through?

A

dkim.org

321
Q

Which type of logging allocates space for a log file on the server and then starts overwriting from the beginning when logging reaches the end of the time frame or the specified log size?

A

Circular logging

322
Q

Which files provide helpful information to an e-mail investigation?

A

Log files and configuration files

323
Q

Which location contains configuration information for Sendmail?

A

/etc/mail/sendmail.cf

324
Q

In which directory do UNIX installations typically store logs?

A

/var/log

325
Q

In which log does Exchange log information about changes to its data?

A

Transaction log

326
Q

In Exchange what type of file is inserted in the transaction log to mark the last point at which the database was written to disk in order to prevent loss of data?

A

Checkpoint file

327
Q

In Microsoft Exchange which file is responsible for messages formatted with MAPI?

A

An .edb file

328
Q

Which information from Facebook simply tells you the last time a person logged on the person’s e-mail address and mobile number and whether the account can be viewed publicly?

A

Basic subscriber info

329
Q

What format is used for the flat plaintext files some e-mail systems use for message storage?

A

mbox

330
Q

Many people store more information on smartphones and tablets than on computers.

A

True

331
Q

Investigating smartphones and other mobile devices is a relatively easy task in digital forensics.

A

False

332
Q

TDMA can operate in the cell phone (800 to 1000 MHz) or PCS (1900 MHz) frequency.

A

True

333
Q

Most basic phones use the same OSs as PCs.

A

False

334
Q

Portability of information is what makes SIM cards so versatile.

A

True

335
Q

In 2010 both VMware and BlackBerry were thinking of developing type 2 hypervisors for mobile devices.

A

True

336
Q

Because bring your own device (BYOD) has become a business standard, investigators must consider how to keep employees’ personal data separate from case evidence.

A

True

337
Q

The IoA will eventually include 4G smart devices and 4G mobile networks.

A

False

338
Q

Gaming consoles such as the Sony PlayStation and Xbox are safe because they don’t contain information hackers might try to intercept and collect.

A

False

339
Q

Research on wearable computers has been conducted at MIT labs for more than a decade and these computers are now moving into working reality.

A

True

340
Q

What technology developed during WWII uses the full radio spectrum to define channels and is now used in the U.S. by Sprint, U.S. Cellular, and Verizon?

A

Code Division Multiple Access (CDMA)

341
Q

Which type of digital network divides a radio frequency into time slots?

A

Time Division Multiple Access (TDMA)

342
Q

Which type of network is a digital version of the original analog standard for cell phones?

A

Digital Advanced Mobile Phone Service (D-AMPS)

343
Q

Which type of digital network is a faster version of GSM designed to deliver data?

A

Enhanced Data GSM Environment (EDGE)

344
Q

Which standard introduced sleep mode to enhance battery life?

A

IS-136

345
Q

Where do phones typically store system data?

A

Electronically erasable programmable read-only memory (EEPROM)

346
Q

What type of cards consisting of a microprocessor and internal memory are usually found in GSM devices?

A

Subscriber identity module (SIM) cards

347
Q

Which devices have been replaced by iPods, iPads, and other mobile devices for personal use?

A

Personal digital assistants (PDAs)

348
Q

What structure is used for the file system for a SIM card?

A

Hierarchical structure

349
Q

What does the SIM file structure begin with?

A

System root

350
Q

Which tool provided by Paraben Software examines Internet of Things (IoT) devices, has a bootloader for locked mobile devices, and can perform data parsing and cloud data capture?

A

E3:DS

351
Q

In a Windows environment what is the default storage location used by BitPim?

A

Documents\BitPim

352
Q

Which forensics software tool contains a built-in write blocker?

A

MOBILedit Forensic

353
Q

The Enhanced Data GSM Environment (EDGE) standard was developed specifically for which type of service?

A

3G

354
Q

What entity created the Interim Standards used in mobile communications?

A

Telecommunications Industry Association (TIA)

355
Q

What technique in which multiple phones take turns sharing a channel does the Global System for Mobile Communications (GSM) use?

A

Time Division Multiple Access (TDMA)

356
Q

What entity developed the 3G standard?

A

International Telecommunication Union (ITU)

357
Q

How much internal memory do mobile devices have?

A

Up to 64 GB

358
Q

Which tool used by government agencies retrieves data from smartphones, GPS devices, tablets, music players, and drones?

A

Micro Systemation XRY

359
Q

Which Cellebrite mobile forensics tool is often used by law enforcement and the military?

A

Cellebrite UFED Forensic System

360
Q

The Internet is the successor to the Advanced Research Projects Agency Network (ARPANET).

A

True

361
Q

A search warrant can be used in any kind of case either civil or criminal.

A

False

362
Q

Specially trained system and network administrators are often a CSP’s first responders.

A

True

363
Q

The law requires search warrants to contain specific descriptions of what’s to be seized. For cloud environments the property to be seized usually describes physical hardware rather than data unless the CSP is a suspect.

A

False

364
Q

In the United States the Electronic Communications Privacy Act (ECPA) describes five mechanisms the government can use to get electronic information from a provider.

A

True

365
Q

In 1999 Salesforce.com developed a customer relationship management (CRM) Web service that applied digital marketing research to business subscribers so that they could do their own market analysis; this service eventually led the way to the cloud.

A

True

366
Q

The platform as a service cloud service is most likely found on a desktop or a server although it could also be found on a company network or the remote service provider’s infrastructure.

A

True

367
Q

Homomorphic encryption uses an ‘ideal lattice’ mathematical formula to encrypt data.

A

True

368
Q

Remote acquisitions are often easier because you’re usually dealing with large volumes of data.

A

False

369
Q

Magnet AXIOM Cloud can retrieve information from Skype, Instagram, Twitter, and iCloud but not from Facebook Messenger.

A

False

370
Q

Metadata in a prefetch file contains an application’s ____ times in UTC format and a counter of how many times the application has run since the prefetch file was created.

A

MAC

371
Q

Which organization has developed resource documentation for cloud service providers and their staff and provides guidance for privacy agreements, security measures, and other issues?

A

Cloud Security Alliance (CSA)

372
Q

In which cloud service level are applications delivered via the Internet?

A

Software as a Service (SaaS)

373
Q

What cloud application offers a variety of cloud services including automation and CRM, cloud application development, and Web site marketing?

A

Salesforce

374
Q

What document issued by a judge compels the recipient to do or not do something?

A

Court order

375
Q

What files created by Microsoft contain the DLL pathnames and metadata used by applications and reduce the time it takes to start applications?

A

Prefetch files

376
Q

What is Microsoft’s SkyDrive now called?

A

OneDrive

377
Q

With cloud systems running in a virtual environment what can be used to give the investigator valuable information before, during, and after an incident?

A

Snapshots

378
Q

Which type of order requires that the government offer specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication or the records or other information sought are relevant and material to an ongoing criminal investigation?

A

Court order

379
Q

A government entity must show that there is probable cause to believe the contents of a wire communication an electronic communication or other records are relevant to an ongoing criminal investigation to obtain which type of order?

A

Search warrant

380
Q

Which tool can be used to bypass a virtual machine’s hypervisor and can be used with OpenStack?

A

Forensic Open-Stack Tools (FROST)

381
Q

What cloud service provides a freeware type 1 hypervisor used for public and private clouds?

A

XenServer and XenCenter Windows Management Console

382
Q

Which folder is most likely to contain Dropbox files for a specific user?

A

C:\Users\username\Dropbox

383
Q

Which type of tool has application programming interfaces (APIs) that allow reconfiguring a cloud on the fly and is accessed through the application’s Web interface?

A

Management plane

384
Q

Which Dropbox file stores information on shared directories associated with a Dropbox user account and file transfers between Dropbox and the client’s system?

A

filecache.dbx

385
Q

At what offset are the application’s last access date and time located in a prefetch file?

A

0x90

386
Q

At what offset is a prefetch file’s create date and time located?

A

0x80

387
Q

Which cloud forensics training program is limited to law enforcement personnel?

A

National Institute of Justice Digital Forensics Training (NIJ DFT)

388
Q

Where is the snapshot database created by Google Drive located in Windows?

A

C:\Users\username\AppData\Local\Google\Drive\user_default

389
Q

Which Google Drive file contains a detailed list of a user’s cloud transactions?

A

sync_log.log

390
Q

Besides presenting facts reports can communicate expert opinion.

A

True

391
Q

A verbal report is more structured than a written report.

A

False

392
Q

If you must write a preliminary report use words such as ‘preliminary copy’, ‘draft copy’, or ‘working draft’.

A

False

393
Q

As with any research paper write the report abstract last.

A

True

394
Q

When writing a report use a formal technical style.

A

False

395
Q

When writing a report style means the tone of language you use to address the reader.

A

True

396
Q

The decimal numbering system is frequently used when writing pleadings.

A

False

397
Q

Lawyers use services called deposition banks (libraries) which store examples of expert witnesses’ previous testimony.

A

True

398
Q

Signposts assist readers in scanning the text quickly by highlighting the main points and logical development of information.

A

True

399
Q

For civil cases including those involving digital forensics investigations U.S. district courts consider optional that expert witnesses submit written reports.

A

False

400
Q

What is the standard format in U.S. federal courts for the electronic submission of documents?

A

Portable Document Format (PDF)

401
Q

Which document serves as a guideline for knowing what questions an investigator should expect when testifying?

A

Examination plan

402
Q

What is most appropriately used to help an attorney learn the terms and functions used in digital forensics?

A

Glossary of terms

403
Q

A written report is often submitted as what type of document?

A

Portable Document Format (PDF)

404
Q

What should be provided if a report is long and complex?

A

An abstract

405
Q

Which document is sworn to under oath and penalty of perjury or a comparable false swearing statute?

A

Affidavit

406
Q

What type of question should an attorney ask to allow an investigator to offer an opinion?

A

Hypothetical

407
Q

Which Federal Rule of Evidence rule governs expert opinions?

A

Federal Rules of Civil Procedure (FRCP) 26; Federal Rules of Evidence (FRE) 702, 703, and 705

408
Q

Anything an investigator writes down as part of examination for a report in a civil litigation case is subject to which action from the opposing attorney?

A

Discovery

409
Q

Because opposing counsel can demand discovery on them what are written preliminary reports considered to be?

A

High-risk documents

410
Q

How many words should an abstract contain?

A

150-200

411
Q

Under FRCP Rule 26 where must the investigator’s curriculum vitae be placed unless the bona fides are integrated elsewhere?

A

Appendices of the written report

412
Q

In addition to decimal numbering what numbering system can be used in a written report?

A

Legal-sequential

413
Q

Which numbering system is being used if the report writer divides material into sections and restarts numbering with each main section?

A

Decimal

414
Q

What format is typically used to cite references in the main body of a report?

A

APA (last name, year of publication)

415
Q

What section of a report should contain broader generalizations?

A

Conclusion

416
Q

What section of a report should restate the objectives, aims, and key questions and summarize the findings with clear concise statements?

A

Conclusion

417
Q

What section of a report can be used for material such as raw data figures not used in the body of the report and anticipated exhibits?

A

Appendices

418
Q

In addition to text, word processing, and spreadsheet formats, which format is used for forensic reports and logs generated by forensic tools?

A

HTML

419
Q

What sections of a report are included in the report body?

A

Introduction and discussion

420
Q

As an expert witness you have opinions about what you have found or observed.

A

True

421
Q

You should create a formal checklist of your procedures that’s applied to all your cases or include such a checklist in your report.

A

False

422
Q

As a standard practice, collect evidence and record the tools you used in designated file folders or evidence containers.

A

True

423
Q

Like a job resume, your CV should be geared for a specific trial.

A

False

424
Q

Part of what you have to deliver to the jury is a person they can trust to help them figure out something that’s beyond their expertise.

A

True

425
Q

The chain of custody of evidence supports the integrity of your evidence.

A

True

426
Q

Depending on your attorney’s needs you might give him or her just your opinion and technical expertise instead of testifying in court; this role is called an expert witness.

A

False

427
Q

Motion in limine includes voir dire of venireman strikes and seating of jurors.

A

False

428
Q

During opening statements both attorneys provide an overview of the case with the plaintiff’s attorney going last.

A

False

429
Q

Whether you’re serving as an expert witness or a fact witness, be professional and polite when presenting yourself to any attorney or the court.

A

True

430
Q

How many roles might a forensics examiner play in a trial?

A

Two

431
Q

In which type of testimony does the investigator present evidence and explain what it is and how it was obtained?

A

Technical or scientific testimony

432
Q

What should you use to verify evidence and thus ensure its integrity?

A

Hash algorithms

433
Q

What should the forensics specialist keep updated and complete in order to support his or her role as an expert and document enhancement of skills through training teaching and experience?

A

Curriculum Vitae (CV)

434
Q

How often should the document describing your expertise and used to qualify your testimony be updated to reflect new cases and additional training?

A

Every three months

435
Q

Which motion provides a written list of objections to certain testimony or exhibits?

A

Motion in limine

436
Q

What term refers to rejecting potential jurors?

A

Voir dire of venireman

437
Q

What optional phase of a trial typically involves an issue raised during cross-examination of a witness?

A

rebuttal

438
Q

How close should a microphone be to the person testifying?

A

6-8 inches

439
Q

How many years of education does the typical juror have?

A

12

440
Q

What method might be used by opposing attorneys to prevent an investigator from serving on an important case?

A

Conflicting out

441
Q

What term refers to evidence that exonerates or diminishes the defendant’s liability?

A

Exculpatory evidence

442
Q

What type of testimony occurs when the investigator answers questions from the attorney who hired the investigator?

A

Direct testimony

443
Q

What is the most important part of an investigator’s testimony at a trial?

A

Direct examination

444
Q

Generally the best approach an attorney can take in direct examination is to ask the investigator what type of questions?

A

Open-ended

445
Q

Leading questions such as ‘Isn’t it true that forensics experts always destroy their handwritten notes’, are referred to as what type of questions?

A

Setup questions

446
Q

What type of questions ask several questions inside one question?

A

Compound questions

447
Q

How is a deposition different from trial testimony?

A

There is no jury or judge present

448
Q

Which type of deposition is used to give an opposing attorney the chance to conduct what amounts to a direct examination and cross-examination of a witness?

A

Discovery deposition

449
Q

Which practice is advisable when an investigator gives a deposition?

A

Stay relaxed and confident, maintain a professional demeanor, use facts, take your time, answer only the questions you are asked

450
Q

People need ethics to help maintain their balance especially in difficult and contentious situations.

A

True

451
Q

In the United States there’s no state or national licensing body for digital forensics examiners.

A

True

452
Q

Experts should be paid in full for all previous work and for the anticipated time required for testimony.

A

True

453
Q

Expert opinions cannot be presented without stating the underlying factual basis.

A

False

454
Q

The American Bar Association (ABA) is a licensing body.

A

False

455
Q

When searching for specific record information sometimes you see duplicate files with the same name that have different data runs meaning the file was written to disk more than once on separate occasions.

A

True

456
Q

As an expert witness you can’t testify if you weren’t present when the event occurred.

A

False

457
Q

When you’re aware of a possible disqualification issue bring it to the attention of the opposing attorney.

A

False

458
Q

No single source offers a definitive code of ethics for expert witnesses so you must draw on standards from other organizations to form your own ethical standards.

A

True

459
Q

There are inherent conflicts between the goals of attorneys and the goals of scientists or technicians (experts).

A

True

460
Q

What are the most important laws applying to attorneys and witnesses?

A

Rules of evidence

461
Q

Forensic examiners may serve as what types of witnesses?

A

Fact and expert

462
Q

What resource might attorneys use to search for information on expert witnesses?

A

Deposition banks

463
Q

What type of questions can give the investigator the factual structure to support and defend his or her opinion?

A

Hypothetical

464
Q

Which Federal Rule of Evidence is used to determine whether the expert is qualified and whether the expert opinion can be helpful?

A

FRE 702

465
Q

Which Federal Rule of Evidence is used to determine whether the basis for testimony is adequate?

A

FRE 703

466
Q

Which organization has stated that, unlike attorneys, expert witnesses do not owe a duty of loyalty to their clients?

A

American Bar Association (ABA)

467
Q

Which document offers comprehensive guidance for psychologists with an entire section devoted to forensics activities?

A

American Psychological Association’s (APA’s) Ethics Code

468
Q

Which standard states that to provide reliable and valid testimony the expert has the ‘ethical responsibility to present a complete and unbiased picture of the . . . research relevant to the case at hand’?

A

Daubert

469
Q

Attorneys who contact many experts as a ploy to disqualify them or prevent opposing counsel from hiring them are using what practice?

A

Conflicting out

470
Q

Which outcome when caused by an ethical lapse could effectively be a death sentence for a career as an expert witness?

A

Disqualification

471
Q

How can an investigator minimize any challenges an opposing attorney could make to discredit the investigator’s report or testimony?

A

Being as thorough as possible

472
Q

In what court case did the court summarize the process of determining whether an expert should be disqualified because of previous contact with an opposing party?

A

Wang Laboratories, Inc. v. Toshiba Corp.

473
Q

Suppose you have been hired to determine whether a corrupted file was intentionally altered or altered by a virus. Your forensic examination did not find evidence of a virus and did not find evidence of intentional alteration. What conclusion can you offer?

A

The cause of the corruption is unknown

474
Q

Which action isn’t usually punitive but can be embarrassing for the professional and potentially for the attorney who retained the professional?

A

Disqualification

475
Q

Which term refers to internalized rules used to measure one’s own performance?

A

Ethics

476
Q

Requesting which of these will deter attorneys from communicating with an investigator solely for the purpose of disqualifying that investigator?

A

Retainer

477
Q

Which of the following options would represent a valid retainer?

A

2-8 hours of your usual billable rate

478
Q

What is reduced by knowing who the parties in a case are?

A

Possibility of a conflict

479
Q

What can a consultant who doesn’t testify earn for finding testifying experts or investigative leads?

A

Contingency fee