Final Exam Terms Flashcards

Study for Final Exam

1
Q

Raw Format

A

refers to capturing the entire content of a storage device, sector by sector, without any interpretation or alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bit Stream Copy

A

This is a bit-by-bit duplication of the original storage medium, including all data, metadata, and slack space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sparse Acquisition

A

Sparse acquisition involves capturing only allocated data, skipping unallocated or free space. This can be useful to reduce the time and storage space required for acquisition, especially when dealing with large storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Handling Encryption

A

Encryption poses a challenge in forensic imaging because encrypted data cannot be accessed without the correct decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Handling Encryption

A

Countermeasures involve obtaining passwords or encryption keys through legal means, using specialized forensic tools to bypass encryption, or conducting memory forensics to extract encryption keys from volatile memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Server RAID Set Acquisition

A

Issues in acquiring data from a RAID set include ensuring that all drives in the array are imaged correctly, handling complex RAID configurations, and dealing with failed or degraded drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Server RAID Set Acquisition

A

Countermeasures involve using specialized RAID controllers or software to reconstruct RAID arrays, ensuring data integrity during the acquisition process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer-Generated Records

A

Those records that are created by a computer system as part of its normal operation, such as logs, system files, or database records. These records are typically automatically generated by software or hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer-Stored Records

A

Files or data that are stored on a computer system, including documents, images, emails, etc. These records are created by users and stored on the computer’s storage medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer-Generated Records and Computer-Stored Records

A

To be usable as evidence, both types of records must be collected and preserved in a forensically sound manner to ensure their integrity and admissibility in court. This involves using forensic imaging techniques to capture the data without altering it, maintaining chain of custody, and documenting the process thoroughly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Geometry of a Hard Drive

A

Refers to the physical layout of data on a hard drive, including sectors, tracks, and cylinders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why it is critical to image an SSD drive as quickly as possible compared to other non-SSD disk?

A

SSDs have wear-leveling algorithms that can dynamically move data around to ensure even wear on the memory cells. Imaging an SSD quickly helps to capture the current state of the wear-leveling algorithm before it redistributes data, which can affect the forensic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HPA (Host Protected Area) and DCO (Device Configuration Overlay)

A

These are hidden areas on hard drives used for system recovery, diagnostics, or vendor-specific purposes. They can contain data hidden from the operating system and standard forensic tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Partition Gap

A

Unused space between partitions on a storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Drive slack

A

Drive slack refers to the leftover space between the end of a file and the end of the last sector allocated to it, which can contain remnants of deleted files or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RAM Slack

A

Refers to data remaining in memory after it’s been allocated to a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

File slack

A

refers to the space between the end of a file and the end of the last sector allocated to it

18
Q

Why are partition gaps and drive slack important to an investigation?

A

Both partition gaps and drive slack can contain valuable forensic evidence, including fragments of deleted files, metadata, or remnants of previous activities.

19
Q

Metadata

A

Data that provides information about other data, such as file creation date, author, permissions, etc.

20
Q

File signature

A

Unique identifying pattern or sequence of bytes used to identify the file type or format. “Magic numbers”

21
Q

File analysis

A

Examination of file content, structure, and metadata to extract information relevant to an investigation.

22
Q

Exif image format

A

Exchangeable Image File Format, which includes metadata tags such as camera settings, GPS coordinates, and timestamps

23
Q

File carving

A

Process of extracting files or data from raw disk images or unallocated space based on file signatures and structure, even if file system metadata is missing or corrupted

24
Q

Lossy compression

A

Compression technique that reduces file size by removing redundant or unnecessary information, resulting in a loss of quality. Example: JPEG compression for images

25
Q

Lossless compression

A

Compression technique that reduces file size without losing any data or quality. Example: ZIP compression for files

26
Q

Steganography

A

Technique of hiding secret messages or data within another file, such as an image or audio file, to avoid detection

27
Q

Substitution

A

In forensic context, refers to the replacement of original data with different data, often to hide or alter incriminating evidence

28
Q

What are the two primary goals of registry forensics?

A
29
Q

Hive

A

Logical group of keys, subkeys, and values in the Windows registry, stored as separate files

30
Q

Subkey

A

Subdivision of a registry key, containing additional keys or values

31
Q

Artifacts

A

Traces or remnants of past activities or events left behind in the registry, which can be used as evidence in forensic investigations

32
Q

Static Acquisition

A

Capturing a snapshot of the entire storage device in a forensically sound manner without modifying its contents

33
Q

Live Acquisition

A

Collecting data from a running system, including volatile memory (RAM), to capture the current state of the system.

34
Q

Transit Acquisition

A

Collecting data while it’s in transit over a network or between devices.

35
Q

Type 1 Hypervisor

A

Runs directly on the host’s hardware to manage virtual machines. Examples include VMware ESXi, Microsoft Hyper-V Server.

36
Q

Type 2 Hypervisor

A

Runs on a conventional operating system and hosts virtual machines as application software. Examples include VMware Workstation, Virtual Box

37
Q

Explain the order of volatility

A

Principle guiding the collection of volatile data in forensic investigations, starting from the most volatile (e.g., RAM) to the least volatile (e.g., disk storage)

38
Q

Explain how to handle VMDK Files (forensically)

A

Virtual Machine Disk files used by VMware. These files can be analyzed using forensic tools capable of interpreting virtual disk formats and extracting relevant data.

39
Q

Anti-forensics and example

A

Techniques used to evade or thwart forensic investigation efforts. Example: Overwriting data multiple times to prevent recovery.

40
Q

Link/shortcut analysis

A

Examination of symbolic links, shortcuts, or aliases to trace relationships between files or directories.

41
Q

Actions to prove anti-forensics

A

Evidence of data wiping, file deletion, encryption, or use of anti-forensic tools.

42
Q

Defense against anti-forenics

A

Employing proactive security measures, monitoring for suspicious activities, and using advanced forensic techniques to detect and counter anti-forensic tactics.