FORMATIVE 2 Flashcards

(51 cards)

1
Q

How does a solid-state drive (SSD) store data?
Group of answer choices

Using tape-based storage

Using magnetic spinning platters

With optical storage discs

Using NAND-based flash memory

A

Using NAND-based flash memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What feature distinguishes ext3 from ext2?
Group of answer choices

Compatibility with older hardware

File journaling support

Faster booting times

Higher compression rates

A

File journaling support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of data structure is used in NTFS to store file metadata?

Inode

Master File Table (MFT)

Superblock

Logical Block

A

Master File Table (MFT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does “journaling” in a file system ensure?

Recovery of data in case of system crashes

File compression for efficient storage

Faster execution of user applications

Permanent deletion of unused files

A

Recovery of data in case of system crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a hard disk drive, what is the purpose of the read/write head?
Group of answer choices

To manage network traffic

To process data stored in RAM

To transfer data between different partitions

To read and write data to/from the disk surface

A

To read and write data to/from the disk surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a common disk interface used in modern hard drives?
Group of answer choices

SATA

NVMe

IDE

Both SATA and NVMe

A

Both SATA and NVMe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the significance of “logical black addressing (LBA)”?

It simplifies the storage addressing system

It describes physical hardware connections

It compresses files for storage efficiency

It determines the encryption key of a hard drive

A

It simplifies the storage addressing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a “superblock” in the context of Linux file systems?
Group of answer choices

A temporary file used during booting

A security feature that encrypts system logs

A reserved area for storing deleted files

Metadata containing information about the entire file system

A

Metadata containing information about the entire file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main purpose of sectors on a hard drive?
Group of answer choices

To store the operating system kernel

To define physical divisions on the disk for data storage

To divide data into compressed files

To encrypt critical system information

A

To define physical divisions on the disk for data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which file system is specific to macOS?
Group of answer choices

ext4

HFS+

NTFS

FAT32

A

HFS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary concern when capturing data from encrypted devices?
Group of answer choices

Creating an incremental backup

Encrypting volatile data

Ensuring compatibility with file systems

Acquiring data without damaging encryption keys

A

Acquiring data without damaging encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which step comes first in the data acquisition process?
Group of answer choices

Securing the scene

Hashing the collected data

Analyzing evidence

Creating a forensic image

A

Securing the scene

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a “bit-stream image” include?
Group of answer choices

Only the active files on a disk

Metadata of the analyzed file system

A compressed copy of user data

A complete copy of all sectors, including deleted and hidden data

A

A complete copy of all sectors, including deleted and hidden data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary objective of data acquisition in digital forensics?
Group of answer choices

Preserving the integrity of evidence during collection

Encrypting evidence for security

Analyzing the original evidence directly

Formatting the storage device for analysis

A

Preserving the integrity of evidence during collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does “selective acquisition” focus on?
Group of answer choices

Hashing volatile system logs

Collecting only relevant files or folders

Analyzing encrypted file systems

Capturing all data on a disk

A

Collecting only relevant files or folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which acquisition tool can capture data at the sector level?
Group of answer choices

dd

EnCase

Sleuth Kit

FTK Imager

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the term “logical acquisition” refer to?
Group of answer choices

Creating a complete bit-stream image

Capturing data from volatile storage

Encrypting file systems during acquisition

Copying only specific files or folders

A

Copying only specific files or folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of an acquisition report?
Group of answer choices

To store acquired data in a compressed format

To outline the steps and tools used during data collection

To encrypt collected evidence for secure transfer

To create backups of volatile data

A

To outline the steps and tools used during data collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is documentation critical during the data acquisition process?
Group of answer choices

To encrypt collected evidence for security

To generate reports for end users

To reduce the size of collected evidence

To track all steps and tools used for evidence collection

A

To track all steps and tools used for evidence collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following data types is considered volatile?
Group of answer choices

Open network connections

Archived emails

Data stored on a USB drive

System logs

A

Open network connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the primary focus of metadata analysis in anti-forensics countermeasures?
Group of answer choices

To identify inconsistencies in file properties

To encrypt sensitive data

To delete unused logs

To compress large datasets for analysis

A

To identify inconsistencies in file properties

22
Q

Which countermeasure is used to detect manipulated timestamps?
Group of answer choices

Metadata verification

Steganalysis

Log correlation

Hash comparison

A

Metadata verification

23
Q

What is the role of secure file deletion software?
Group of answer choices

To overwrite data to ensure it cannot be recovered

To encrypt files for storage

To create backups of important files

To compress large files for transmission

A

To overwrite data to ensure it cannot be recovered

24
Q

Which anti-forensics technique is aimed at hiding the true content of files?
Group of answer choices

Encryption

Log wiping

File carving

Metadata alteration

25
Why is recovering overwritten files particularly challenging? Group of answer choices Overwriting increases system performance The original data is compressed during overwriting Overwritten data cannot be recovered without specialized tools Overwritten data is encrypted
Overwritten data cannot be recovered without specialization tools
26
What is the main goal of anti-forensics? Group of answer choices To recover lost data from storage devices To prevent forensic investigators from accessing or analyzing evidence To enhance data security To encrypt sensitive files
To prevent forensic investigators from accessing or analyzing evidence
27
What is the primary challenge with detecting steganography? Group of answer choices It uses strong encryption methods It requires specialized hardware for analysis It leaves no visible traces of hidden data It compresses files beyond recovery
It leaves no visible traces of hidden data
28
What does the term "hash collision" refer to? Group of answer choices Two different pieces of data producing the same hash value A mismatch between original and duplicate files A failure to generate a valid hash value A corrupted metadata entry
Two different pieces of data producing the same hash value
29
What is the purpose of log wiping in anti-forensics? Group of answer choices To improve system performance by removing old logs To create backups of system logs To erase traces of user activity from log files To encrypt system log files for security
To erase traces of user activity from log files
30
Which of the following tools can be used to detect and counter steganography? Group of answer choices Timestomp FTK Imager ExifTool Volatility
ExifTool
31
Which Linux file system introduced journaling? ext3 FAT32 NTFS ext4
ext3
32
What is the key difference between HFS+ and APFS in macOS? Group of answer choices APFS is optimized for SSDs HFS+ provides faster data access APFS is incompatible with modern macOS versions HFS+ supports file journaling while APFS does not
APFS is optimized for SSDs
33
What is the main purpose of the FAT32 file system? Group of answer choices To support older operating systems with a simpler structure To manage large disks with greater reliability To encrypt files for security To compress files for efficient storage
To support older operating systems with a simpler structure
34
What is the primary function of a file system? Group of answer choices To organize and manage data on storage devices To analyze network activity To create backups of critical system files To secure files using encryption
To organize and manage data on storage devices
35
What is an inode in Linux file systems? Group of answer choices A process used to encrypt file names A structure that stores metadata about files A temporary data storage unit A type of directory
A structure that stores metadata about files
36
Which file system is specific to macOS? Group of answer choices ext4 FAT32 HFS+ NTFS
HFS+
37
What is the main advantage of SSDs over HDDs? Group of answer choices Higher data storage capacity Lower cost Faster data access speeds Longer lifespan
Faster data access speeds
38
Which of the following is an essential feature of solid-state drives (SSDs)? Group of answer choices Dependence on moving parts Use of tape-based storage mechanisms Rotating magnetic disks for data storage Low latency and faster read/write speeds
Low latency and faster read/write speeds
39
What is the role of a write blocker during data acquisition? Group of answer choices Encrypting data on the original device Preventing modifications to the original evidence Blocking unauthorized network access Allowing data to be modified securely
Preventing modifications to the original evidence
40
Which of the following is an example of live data acquisition? Group of answer choices Imaging a hard drive of a powered-off system Capturing data from a network in real time Creating backups of archived data Copying deleted files from a USB drive
Capturing data from a network in real time
41
Which file format is NOT commonly used for data acquisition? Group of answer choices NTFS RAW E01 AFF
NTFS
42
How does the dd tool assist in data acquisition? Group of answer choices By analyzing metadata of captured files By creating a bit-by-bit copy of storage media By hashing collected evidence By capturing live network traffic
By creating a bit-by-bit copy of storage media
43
Which of the following is a challenge in data acquisition? Group of answer choices Encrypting acquired evidence Maintaining the integrity of volatile data Ensuring compatibility with all file systems Analyzing archived data
Maintaining the integrity of volatile data
44
Which of the following is an example of static acquisition? Group of answer choices Recording real-time network traffic Imaging a powered-off laptop hard drive Capturing RAM data from a live system Collecting data from open processes
Imaging a powered-off laptop hard drive
45
What is a key advantage of using AFF for data acquisition? Group of answer choices It supports real-time analysis of volatile data It compresses data for efficient storage It allows direct access to deleted files It encrypts acquired data by default
It compresses data for efficient storage
46
What does steganography involve? Group of answer choices Compressing large files for transmission Hiding information within other files, such as images or videos Deleting unnecessary system logs Encrypting files for secure storage
Hiding information within other files, such as images or videos
47
Which tool is commonly used to detect timestamp manipulation? Group of answer choices Timestomp FTK Imager ExifTool Wireshark
ExifTool
48
What is the purpose of anti-forensics countermeasures? Group of answer choices To encrypt system logs for security To compress files for faster transmission To assist forensic investigators in detecting and analyzing evidence tampering To hide user activity on a system
To hide user activity on a system
49
How can forensic investigators counter log wiping? Group of answer choices By recovering deleted logs from slack space By compressing recovered logs By using specialized log recovery tools By encrypting system logs for security
By using specialized log recovery tools
50
Which anti-forensics technique can prevent hash-based file analysis? Group of answer choices File deletion Data encryption Hash collision generation Metadata modification
Hash collision generation
51
What is the main objective of anti-forensics countermeasures? Group of answer choices To encrypt sensitive data for long-term storage To detect, recover, and analyze tampered or hidden evidence To assist in system performance optimization To simplify forensic investigations
To detect, recover, and analyze tampered or hidden evidence