Forensic Analysis Flashcards

(12 cards)

1
Q

Where are local passwords stored for the Windows operating system?

A

SAM file in \Windows\System32\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A forensic examiner wants to try to extract passwords for wireless networks to which a system was connected. Where should passwords for wireless networks be stored on a Windows XP system?

A

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Windows password cracking tool uses rainbow tables?

A

Ophcrack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should a forensic investigator use to gather the most reliable routing information for tracking an email message?

A

Email header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which activity involves email tracing?

A

Determining the ownership of the source email server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A forensic examiner reviews a laptop running OS X which has been compromised. The examiner wants to know if there were any mounted volumes created from USB drives. Which digital evidence should be reviewed?

A

/var/log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which log or folder contains information about printed documents on a computer running Mac OS X?

A

/var/spool/cups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Windows event log should be checked for evidence of invalid logon attempts?

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A cyber security organization has issued a warning about a cybercriminal who is using a known vulnerability to attack unpatched corporate Macintosh systems. A network administrator decides to examine the software updates logs on a Macintosh system to ensure the system has been patched. Which folder contains the software updates logs?

A

/Library/Receipts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A forensic investigator is assigned the task of unlocking a locked Apple iPod Touch 4G. Which forensic tool should the investigator use?

A

Pwnage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An investigator wants to extract information from a mobile device by connecting it to a computer. What should the investigator take great care to ensure?

A

That the mobile device does not synchronize with the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which state is a device in if it is powered on, performing tasks, and able to be manipulated by the user?

A

Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly